The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

Size: px
Start display at page:

Download "The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems"

Transcription

1 The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box Tel: , Fax: Abstract: - It is well kow that crossbar switch has the best performace amog the multiprocessor itercoectio etworks. However expadig this switch so that the performace grows liearly with the umber of processig elemets (N) is costly ad complicated. The size of the switch grows as a fuctio of N 2. This paper presets a expasio scheme, which keeps the liearity betwee the performace, the umber of processig elemets ad the umber of switches.16x16 ad 32x32 crossbar switch modules are used as buildig blocks of this scheme. It is a modular scheme as well ad so othig eeds to be redesiged. The results of mathematical aalysis show that the performace of this scheme is better tha that of a Delta MIN built if 4x4crossbar switch modules (Delta-4) ad comparable to that of MINs built with the same crossbar switch module size, i.e., Delta-16 ad Delta-32.The cost efficiecy of this scheme is better tha that of ay other etwork except Delta-4 MIN. Key Words: Itercoectio Networks, Multiprocessors, Scalability, Modularity, Crossbar, Performace, Cost Efficiecy, Mathematical Model. 1. Itroductio I multiprocessor ad multi-computer systems, the itercoectio etwork is of prime importace. It is the medium through which the processig elemets or the computers of the system exchage iformatio. Over the last three decades, large umber of etwork topologies were proposed, desiged, implemeted ad tested. May were mathematically aalyzed or simulated [1, 2]. I all etworks, the major cocer was ad is still, to achieve a better performace ad a better scalability. Performace is measured i terms of badwidth or throughput, probability of acceptace ad latecy. Scalability is a rather imprecise term used to idicate a desig that allows the system to be icreased i size ad i doig so, obtai icreased performace. This is similar to the defiitio of modularity give by Stestrom [3], which states " for a multiprocessor to be modular, the badwidth of the etwork must be proportioal to the umber of processors i the system". Icreasig the system meas expadig it by addig more fuctioal uits to obtai higher performace without redesigig these uits (expadability). The crossbar switch etwork was first proposed by Wulf ad Bell i 1972, ad implemeted by Wulf ad his team i 1981 as reported i [1]. From its early aalysis ad implemetatios [1,2,4], It became well kow that the crossbar switch etwork has the best performace amog the multiprocessor etworks. Its badwidth steadily icreases after a certai size. However, for a full crossbar etwork (NXN), doublig the umber of its iputs ad outputs meas icreasig the umber of switches four times i order to keep the scalability measures. This process ecessitates the redesig of the system. May attempts were made i order to desig scalable ad easily expadable crossbar-based systems. I all those attempts, the desigers realized that they could t achieve full scalability ad expadability at the same time. So, they resorted to compromise the two measures. The most famous example is the large umber ad variety of multistage itercoectio etworks (MINs) that were desiged usig small crossbar modules as buildig blocks. Samples of these MINs are show i [5-7]. The performace of the MIN etwork lies betwee the performace of the crossbar ad that of the shared bus[1,2 ]. Delta etwork built with 4x4 crossbar uits proved to be the most cost effective amog the MIN etworks if the cost is calculated i terms of the umber of switches used 1

2 i the etwork [5]. However, the advet i VLSI techology has made this measure of less importace. I 1993, Barry Wilkiso proposed, aalyzed ad simulated a overlapped scalable topology for the crossbar switch. I this topology rhombic crossbar modules are coected to each other so that the processor ca access two memory modules i two eighborig crossbar modules. As far as the processor is tryig to access memories i eighborig modules, its performace matches that of a full crossbar, but if the rage of requests reaches farther, the badwidth will be degraded drastically [8].The mai issue ow is to achieve a better performace for a modular(scalable ad easily expadable) desig. I this paper, the author presets a scalable crossbar ad a cost effective scheme which is easy to expad, easy to cotrol, ad yet has a performace comparable, ad sometimes better tha those of MINs havig the same umber of iputs ad outputs. The scheme will be aalyzed for multiprocessor systems the, i a separate work, it will be show how the scheme ca be used for multi-computer systems. This work was doe eight moths ago for two purposes. Firstly to model the proposed expasio of the traditioal crossbar switch used i multiprocessor systems, ad secodly, to use its results as a idicator for the expected results of the expasio scheme of a ewly proposed STC104 like crossbar switch for multi-computer etworks. The idea of this switch was first proposed, desiged ad simulated at The Jordaia Uiversity of Sciece ad Techology (JUST) i Jorda [9]. The results obtaied the bettered those of the STC104 switch show i [10]. Curretly the author is supervisig a M.Sc project o a improved versio of the JUST switch ad its expasio accordig to this scheme (Peta-S) at Al-Quds Uiversity i Jerusalem. The prelimiary simulatio results have show to be cosistet with the results of the mathematical model preseted i this paper ad they will be submitted i separate papers i the ear future. 2. The Peta-S Scheme The buildig block i this scheme is a full (x crossbar module of the multiprocessor type. By multiprocessor type we mea that the data ad the address are preseted o separate parallel busses ad each destiatio bus of the crossbar has its ow arbiter. No iput or output buffers are used. Each module ca accommodate processig elemets (PEs) of a multiprocessor. A -shuffle coectio is used to coect up to (+1) of these modules. For example, if 32X32 size crossbar modules are used as buildig blocks, the up to 1056 PEs ca be coected usig this scheme, see figure 1-A. Each PE i the etwork is provided with two ports; oe to coect it to its crossbar module (hereiafter referred to as the crossbar port), ad the other to coect it to a PE of aother module i the scheme via the shuffle (hereiafter called the shuffle port). Each port has a iput ad a output see figure 1-B. The iput of crossbar port has a bypass cotrol uit to pass the iformatio to the output of the shuffle port if the iformatio belogs to a PE i aother crossbar module. The iput of the shuffle port is provided with a buffer i order to keep the icomig requests from other modules pedig their service via the output of the crossbar port i the comig etwork cycles. This topology forms a Sigle Stage-Sigle Shuffle Scalable system, hece the ame Peta-S scheme. The -shuffle provides a direct lik betwee each PE i the crossbar module ad its correspodet (cliet) i aother module. Each two correspodets are meat to provide a uique commuicatio chael betwee two crossbar modules. For example, the shuffle port of PE5 of module 2 (PE25) is coected via the shuffle to the shuffle port of PE2 of module 5 (PE52). This makes PE25 ad PE52 two correspodets, which serve the commuicatio betwee the PEs of modules 2 ad 5. Figure 1 shows a block diagram of the system ad the two ports of the PE. The shuffle lik is desiged to coect +1 crossbar modules of x size. Note i figure 2 that the shuffle is desiged so that the shuffle port output of PEij is coected to the shuffle port iput of PEji ad vice versa for all (i /= j). Note also that the ports of PEij are coected to PEkj for all (i = j ),where k =+1. I figure 2, PE11, PE22, ad PE33 are coected to PE41, PE42 ad PE43 respectively. 2

3 . Figure 1-A: A block diagram of the system oe etwork cycle PE13 seds the data to PE12. The Bypass mechaism of PE12 port recogizes that the data does ot belog to PE12 ad directs it to the output of the shuffle port. Thus the data goes directly to the iput of PE21 shuffle port ad stored i a local buffer. I the ext cycle PE21 seds the data locally via module 2 to PE22. Figure 1-B: The Crossbar ad the Shuffle ports of the processig elemet. 3. The Commuicatio Process I this system, all the requests are preseted iterally, i.e., withi the crossbar module, regardless of whether the destiatio belogs to the same module as the source or belogs to aother module. I case the destiatio belogs to aother module, the bypass mechaism allows the data to go directly through the shuffle lik to the cliet PE i that module. The data is stored i a temporary buffer i that PE i order to be set to the fial destiatio i the ext cycle. For example, assume i figure 1 (see also figure 2 to follow the example) that the output of device PE12 shuffle port is coected via the shuffle to the iput of device PE21 shuffle port. This meas that device PE21 represets the cliet destiatio of module 1 i module 2. Assume ow that device PE13 wat to sed data to device PE22.The commuicatio process takes place as follows: I Figure 2: A 3-shuffle, which coects four 3X3 crossbar modules (a total of 12 PEs). Regardig the priority, the devices give higher priority to their ow requests i oe cycle ad a higher priority to the requests comig from other modules i the ext. This pre-determied priority guaratees fairess betwee local ad global requests. The priority for accessig the destiatio withi the module depeds o the priority algorithm used i the module desig. 3

4 4. The System Mathematical Aalysis Mathematical aalysis suits the tightly coupled multiprocessor etworks more tha multicomputer etworks. This is due to the fact that i multiprocessor etworks the request ca be preseted, arbitrated for ad accepted or rejected i the same cycle. I multicomputer systems, other requests ca arrive while previous requests are beig served. This makes multi-computer etworks difficult to be mathematically aalyzed. However, for certai topology, aalyzig the multiprocessor etwork gives a good idicatio of the correspodig multi-computer etwork behavior. So the author decided to mathematically aalyze the multiprocessor versio of the PENTA- S scheme. Simulatio for the multi-computer versio of PENTA-S will be preseted i a ear future work. I aalyzig this scheme, the followig assumptios are used: 1.x crossbar modules, which ca coect sources to destiatios, are used as a buildig block i this scheme. 2. k modules are used i buildig the system, where k ca have a maximum value of The devices preset their ow requests i oe cycle ad requests comig from other modules i the ext. 4. The rejected requests will be discarded. 5. The cycle is defied as the time required for the request to be preseted, arbitrated for ad served. 6. The probability that a device is makig a request durig oe cycle is r, ad the probability that it is havig a request comig from aother module durig a previous cycle is p. 4.1 Badwidth ad Probability of Acceptace Aalysis I the ith cycle the badwidth of each module is give by the followig equatio: r BW (, ) = 1 (1) Assume k blocks are used the it is expected that 1 BW (, Requests are accepted for local k k 1 PEs, ad BW (, requests are accepted ad k trasferred to other blocks via the shuffle. I the (i+1)th cycle, the probability that requests from other block have arrived is p, ad the probability that a local processor has made a request is r. The priority is give for requests from other blocks. The the probability that there is a request is give by: R = r + p rp (2) So the expected badwidth i the (i+1)th cycle is R BW2 (, ) = 1 (3) So the total badwidth for each block i both cycles 1 r R BW12 (, = k (4) where R is give by equatio (2), ad p is give k 1 r by: p = 1 i.e., k k 1 r p = 1 1 (5) k Multiplyig equatio (4) by K gives the badwidth of the system for two successive cycles r R BW12 ( k,, = 1 + k 1.(6) So the average badwidth of the system per cycle is give by: BW12 ( k,, BW ( k,, = (7) 2 This equatio reduces to N p ( r + p rp) BW ( k,, = k 1 (8) Where N = k The probability of acceptace P a is defied as the ratio betwee the badwidth ad the expected umber of requests durig a cycle. BW ( k,, P a ( k,, = (9) A 4

5 ( r + R) N Where A = 2 For the purpose of compariso, the badwidth ad the probability of acceptace of full crossbar ad a delta-4 multistage itercoectio etwork are stated i the followig equatios: The badwidth of NXN crossbar is give by r BW ( N, N ) = N N 1 (10) N where r is the probability that a PE is makig a request durig a cycle. The probability of acceptace of the crossbar is give by BW ( N, N) P a ( N, N) = (11) rn The badwidth of a delta-b etwork which uses (bxb)crossbar modules as buildig blocks is give by: BW = i delta ( b, b) b ri (12) Where the umber of iputs ad outputs N is i give by: N = b, where i is the umber of stages i the etwork The results obtaied from equatios 8 to 12 are plotted ad discussed i the ext sectio of this paper. 5. The Results of Mathematical Aalysis 5.1 The Badwidth The badwidth ad the probability of acceptace of PENTA-S, NXN crossbar ad delta-4 etworks are obtaied from the above equatios over various values of N,two values of r (1 ad 0.5), ad two values of K (32 ad 16). The results are show i figures 3 to 17. Note that the term Delta- meas a Delta MIN built of xcrossbar modules, the term Peta- meas a Peta etwork topology built of x crossbar modules, BW meas the badwidth, BW(NXN) meas the badwidth of a full NXN crossbar ad BW(NX0.5N) meas the badwidth of half full crossbar etwork. Figure 3 shows the badwidth of Peta-32 as compared to Delta ad crossbar etworks. The figure shows that Peta-32 has the same badwidth as Delta-4 for N<=256 at r = 1 ad a N higher badwidth tha Delta-4 for N>256 at (r=1). It also has a better badwidth at r = 1 tha the half crossbar etwork (NX0.5N) at r =0.5. The badwidth of Peta-32 is also compareable to those of half crossbar, Delta-32 ad Delta-16 for N<512 at r = 1. It must be oted that Peta etwork betters the Deltas ad the crossbar etworks i beig modular ad easily expadable. As most of MINs use 4X4 switches as buildig blocks, i.e., they are of Delta-4 type, we ca say that Peta32 betters them i havig higher badwidth, beig more modular ad easier to expad. Most MINs are of Delta-4 type because the 4X4 switch prooved to be the most cost efficiet switch size for buildig MINs [5]. Figure 3: Badwidth of Peta-32 as compared to other etworks at r=1 Figure 4:Badwidth of Peta-16 as compared to Halfad Full-Crossbar etworks 5

6 Figure 4 shows the badwidth of Peta-16 as compared to other etworks for 16=<N=<256 (The maximum size of Peta-16 is 272 PEs). Over this rage, the badwidth of Peta-16 at r = 1 is higher tha badwidth of the half crossbar at r = 0.5 ad less tha that of Peta-32 at r=1. Its badwidth is also comparable to the badwidth of the half crossbar at r = 1. Figure 5 shows the badwidth of Peta-16 as compared to those of Delta etworks at r=1. The figure shows clearly that the badwidth of Peta-16 is early the same as that of Delta-4 ad less tha those of Deltas 16 ad 32. Regardig the modularity ad expadability, the above argumet of Peta-32 applies to Peta-16 as well. Fifure 7 :Badwidth of Peta-16 as compared to other etworks at r=0.5 Figures 6 ad 7compares the badwidth of Petas 32 ad 16 to the badwidth of other etworks at r = 0.5. These figures show that reducig r does ot chage the positio of Peta etworks with respect to other etworks regardig the badwidth. 5.2 The Probability of Acceptace The probability of acceptace is a measure which shows the probability of acceptig a request durig a cycle. The reciprocal of the probability of acceptace idicates the average latecy, i cycles, of servig the request. Figure 5: Badwidth of Peta-16 as compared to Delta etworks at r = 1. Figure 6 : The Badwidth of Peta-32 as compared to other etworks at r=0.5 Figure 8:Probability of Acceptace of Peta-32 as compared to other etworks at r=1 6

7 Figure 8 shows the probability of acceptace of Peta-32 as compared to other etworks at r =1. It is clear from the figure that Peta-32 has a higher probability of acceptace tha Delta-4 etwork for all values of N exept N =256 where they have equal probability of acceptace. We ca ote from the figure that Delta-16, Delta-32, ad Full crossbar etworks have higher probability of acceptace tha Peta-32. The probability of acceptace of Half Crossbar etwork falls betwee the probability of acceptace of Delta-32 ad that of delta-16 for N>384 ad r =1. acceptace. Figure 9 shows that Peta-16 ad Delta-4 have, more or less, the same probability of acceptace for N > 48. Figures 10 ad 11 show that chagig the value of r to 0.5 does ot chage the positio of Peta etworks with respect to other etworks regardig the probability of acceptace. Figure 11 :Probability of Acceptace of Peta 16 as compared with other etworks at r = 0.5 Figure 9:Probability of Acceptace of Peta-16 as compared to other etworks at r=1 5.3 The Cost Efficiecy I this study the author calculates the cost efficiecy i terms of the badwidth per simple switch. This is simply because the etworks used i this study utilizes various switch sizes. However, regardless of the switch size, all the switchig elemets are built of simple switches. Figure 10:Probability of Acceptace of Peta-32 as compared to other etworks at r=0.5 For N<384 Half-crossbar has less probability of acceptace tha both Delta-32 ad Delta-16. Also, we ca ote that i Delta etworks, the larger the size of the switch, the higher the probabilty of Figure 12:Cost Efficiecy of Petas 16 ad 32 as compared to other etworks For example the 4X4 switch used i delta-4 is a 4X4 crossbar switch that is made of 16 simple 7

8 switches ad the 16X16 switch used i Delta-16 ad Peta-16 is a 16X16 crossbar switch made of 256 simple switches. Figure12 shows the cost efficiecy of Peta-32 ad Peta-16 as compared to those of other etworks. It is clear that the most cost efficiet Network is Delta-4, the thig with agrees with the calculatios preseted i [5]. However as ow we have 16X16 ad 32X32 crossbar switches itegrated o oe chip it is more temptig to build Delta MINS of these chips, i.e., Delta-16 & Delta- 32, to have a better performace. Figure 13 compares the cost efficiecy of Peta-32 to those of Delta-16 ad Delta-32. It is clear that the cost efficiecy of Peta-32 is higher tha that of Delta- 32. Delta-16 has a higher cost efficiecy that that of Peta-32 oly for umber of PEs<100. grows with the same rate as the umber of PEs, i.e., the size of the switch grows as a fuctio of N 2, where N is the umber of the PEs the switch desiged to serve. Figure 14:Cost per PE of Petas 16 ad 32 as compared to Delta etworks Figure 13:Cost Effeciecy of Peta-32 as compared to Delta Networks 5.4 The Cost Per Processig Elemet Figures 14 ad 15 show two thigs, Firstly, Peta etworks have a fixed cost per processig elemet regardless of the size of the etworks, 16 simple switches per PE for Peta-16 ad 32 simple switches per PE for Peta-32. For umber of processig elemets N>=128, Delta-4 matches Peta-16, i this measure. For umber of PEs N>=64 Delta-16 matches Peta-32. So Peta etwork allows the usage of larger switch size without the pealty of the cost. Note that the cost per processig elemet for the full crossbar C/PE(FCB) ad the half crossbar C/PE(HCB) Figure 15:Cost per PE of Petas 32 ad 16 as compared to Half ad Full Crossbar etworks 6. Coclusio I this paper we have mathematically aalyzed the behavior of a ew scheme of coectig clusters of multiprocessor systems. The term scheme meas the topology plus its usage (especially, the local ad global addressig plus assigig a cliet for each module i all other modules of the etwork). This proposed scheme is a mixture of circuit switchig ad wormhole routig schemes, i the 8

9 sese that iside the crossbar module, the Network behaves i a circuit switchig fashio, where as i the case the request is made for other modules, the request bypasses th the local cliet PE of the destiatio module to the buffer associated with the cliet PE i the destiatio module. The cliet i the destiatio module allows the buffer to preset its request iterally i order to address its fial destiatio. This is very much like the wormhole routig but with a sigle middle stage i the way to its destiatio. The performace of such a scheme proved to be better tha that of the traditioal MINs built of (4X4) crossbar switch modules, ad comparable to that of moder MINs built of 16X16 ad 32X32 crossbar modules. It is cost effective, easy to expad, ad has a reasoable aggregate scalability Overlappig Coectivity, IEEE Tras. Compu., V. 41, No. 6, PP [9] Nabeel Hasaseh, Router Architecture With Collisio Avoidace Cotrol Usig Crossbar Switch i Multicomputer Systems, M.Sc Thesis, Supervised by T. El-Dos ad A. Ayyad, Computer Egieerig Departmet, JUST Uiversity, Jorda, July [10] P.W Thompso ad J.D Lewis, The STC104 Packet Routig Chip, SGS- Thomso Microelectroics Limited, Bristol,Eglad, 1997, PP Refereces [1] K. Hwag ad F. Briggs, " Computer Architecture ad Parallel Processig", McGraw-Hill, USA, [2] B. Wilkiso, Computer Architecture; Desig ad Performace, 2 d editio, Pretice Hall Europe, Hertford shire, U.K,1996. [3] P. Stestrom, Reducig the cotetio i Shared memory Multiprocessors, IEEE Computer, V. 21, No. 11,Nov, 1988, PP [4] B. Wilkiso ad H. Abachi, " Crossbar Switch Multiprocessor System", Microprocessors ad Microsystems, Vol. 7, No. 2, March 1983, PP [5] L. Bhuya ad D. Agrawal, " Desig ad Performace of Geeralized Shuffle Networks", IEEE Trasactio o Computers, Vol. C-32, No. 12, Dec., 1983, PP [6] C-L. Wu ad T-Y. Feg, "O a Class of Multistage Itercoectio Networks, IEEE Trasactio o Computers, Vol. C-29, No. 8, Aug. 1980, PP [7] J. Patel, Performace of Processor-Memory Itercoectio for Multiprocessors IEEE Trasactio o Computers, Oct., 1981, PP [8] A.B. Wilkiso, O Crossbar Switch ad Multiple Bus Itercoectio Networks With 9

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

Switch Construction CS

Switch Construction CS Switch Costructio CS 00 Workstatio-Based Aggregate badwidth /2 of the I/O bus badwidth capacity shared amog all hosts coected to switch example: Gbps bus ca support 5 x 00Mbps ports (i theory) I/O bus

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

Multiprocessors. HPC Prof. Robert van Engelen

Multiprocessors. HPC Prof. Robert van Engelen Multiprocessors Prof. Robert va Egele Overview The PMS model Shared memory multiprocessors Basic shared memory systems SMP, Multicore, ad COMA Distributed memory multicomputers MPP systems Network topologies

More information

On Nonblocking Folded-Clos Networks in Computer Communication Environments

On Nonblocking Folded-Clos Networks in Computer Communication Environments O Noblockig Folded-Clos Networks i Computer Commuicatio Eviromets Xi Yua Departmet of Computer Sciece, Florida State Uiversity, Tallahassee, FL 3306 xyua@cs.fsu.edu Abstract Folded-Clos etworks, also referred

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

1 Enterprise Modeler

1 Enterprise Modeler 1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network

More information

UNIVERSITY OF MORATUWA

UNIVERSITY OF MORATUWA UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Egieerig 2014 Itake Semester 2 Examiatio CS2052 COMPUTER ARCHITECTURE Time allowed: 2 Hours Jauary 2016

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

On Multicast Scheduling and Routing in Multistage Clos Networks

On Multicast Scheduling and Routing in Multistage Clos Networks O Multicast Schedulig ad Routig i Multistage Clos Networks Bi Tag Departmet of Computer Sciece Stoy Brook Uiversity Stoy Brook, NY 794 bitag@cs.suysb.edu Abstract Multicast commuicatio, which ivolves trasmittig

More information

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks Iterferece Aware Chael Assigmet Scheme i Multichael Wireless Mesh Networks Sumyeg Kim Departmet of Computer Software Egieerig Kumoh Natioal Istitute of Techology Gum South Korea Abstract Wireless mesh

More information

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager.

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager. CS2310 Fial Project Loghao Li Term Project Report Itroductio I this project, I worked o expadig exercise 4. What I focused o is makig the real gesture recogizig sesor ad desig proper gestures ad recogizig

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

CS 683: Advanced Design and Analysis of Algorithms

CS 683: Advanced Design and Analysis of Algorithms CS 683: Advaced Desig ad Aalysis of Algorithms Lecture 6, February 1, 2008 Lecturer: Joh Hopcroft Scribes: Shaomei Wu, Etha Feldma February 7, 2008 1 Threshold for k CNF Satisfiability I the previous lecture,

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

BOOLEAN MATHEMATICS: GENERAL THEORY

BOOLEAN MATHEMATICS: GENERAL THEORY CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.

More information

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only

Bezier curves. Figure 2 shows cubic Bezier curves for various control points. In a Bezier curve, only Edited: Yeh-Liag Hsu (998--; recommeded: Yeh-Liag Hsu (--9; last updated: Yeh-Liag Hsu (9--7. Note: This is the course material for ME55 Geometric modelig ad computer graphics, Yua Ze Uiversity. art of

More information

Course Site: Copyright 2012, Elsevier Inc. All rights reserved.

Course Site:   Copyright 2012, Elsevier Inc. All rights reserved. Course Site: http://cc.sjtu.edu.c/g2s/site/aca.html 1 Computer Architecture A Quatitative Approach, Fifth Editio Chapter 2 Memory Hierarchy Desig 2 Outlie Memory Hierarchy Cache Desig Basic Cache Optimizatios

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Goals of the Lecture UML Implementation Diagrams

Goals of the Lecture UML Implementation Diagrams Goals of the Lecture UML Implemetatio Diagrams Object-Orieted Aalysis ad Desig - Fall 1998 Preset UML Diagrams useful for implemetatio Provide examples Next Lecture Ð A variety of topics o mappig from

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao

More information

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 10 Defiig Classes Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 10.1 Structures 10.2 Classes 10.3 Abstract Data Types 10.4 Itroductio to Iheritace Copyright 2015 Pearso Educatio,

More information

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution

Multi-Threading. Hyper-, Multi-, and Simultaneous Thread Execution Multi-Threadig Hyper-, Multi-, ad Simultaeous Thread Executio 1 Performace To Date Icreasig processor performace Pipeliig. Brach predictio. Super-scalar executio. Out-of-order executio. Caches. Hyper-Threadig

More information

Protected points in ordered trees

Protected points in ordered trees Applied Mathematics Letters 008 56 50 www.elsevier.com/locate/aml Protected poits i ordered trees Gi-Sag Cheo a, Louis W. Shapiro b, a Departmet of Mathematics, Sugkyukwa Uiversity, Suwo 440-746, Republic

More information

Properties and Embeddings of Interconnection Networks Based on the Hexcube

Properties and Embeddings of Interconnection Networks Based on the Hexcube JOURNAL OF INFORMATION PROPERTIES SCIENCE AND AND ENGINEERING EMBEDDINGS OF 16, THE 81-95 HEXCUBE (2000) 81 Short Paper Properties ad Embeddigs of Itercoectio Networks Based o the Hexcube JUNG-SING JWO,

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Chapter 4 The Datapath

Chapter 4 The Datapath The Ageda Chapter 4 The Datapath Based o slides McGraw-Hill Additioal material 24/25/26 Lewis/Marti Additioal material 28 Roth Additioal material 2 Taylor Additioal material 2 Farmer Tae the elemets that

More information

ECE4050 Data Structures and Algorithms. Lecture 6: Searching

ECE4050 Data Structures and Algorithms. Lecture 6: Searching ECE4050 Data Structures ad Algorithms Lecture 6: Searchig 1 Search Give: Distict keys k 1, k 2,, k ad collectio L of records of the form (k 1, I 1 ), (k 2, I 2 ),, (k, I ) where I j is the iformatio associated

More information

ANN WHICH COVERS MLP AND RBF

ANN WHICH COVERS MLP AND RBF ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

Design of efficient, virtual non-blocking optical switches

Design of efficient, virtual non-blocking optical switches Desig of efficiet, virtual o-blockig otical switches Larry F. Lid, Michael Sratt Mobile Systems ad Services Laboratory HP Laboratories Bristol HPL-200-239 March 3 th, 2002* otical switchig, switch desig

More information

Requirements Analysis

Requirements Analysis Iformatio Systems Cocepts Requiremets Aalysis Roma Kotchakov Birkbeck, Uiversity of Lodo Based o Chapter 7 of Beett, McRobb ad Farmer: Object Orieted Systems Aalysis ad Desig Usig UML, (4th Editio), McGraw

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

1&1 Next Level Hosting

1&1 Next Level Hosting 1&1 Next Level Hostig Performace Level: Performace that grows with your requiremets Copyright 1&1 Iteret SE 2017 1ad1.com 2 1&1 NEXT LEVEL HOSTING 3 Fast page loadig ad short respose times play importat

More information

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet

More information

CS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python

CS 111: Program Design I Lecture 19: Networks, the Web, and getting text from the Web in Python CS 111: Program Desig I Lecture 19: Networks, the Web, ad gettig text from the Web i Pytho Robert H. Sloa & Richard Warer Uiversity of Illiois at Chicago April 3, 2018 Goals Lear about Iteret Lear about

More information

EE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 )

EE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 ) EE26: Digital Desig, Sprig 28 3/6/8 EE 26: Itroductio to Digital Desig Combiatioal Datapath Yao Zheg Departmet of Electrical Egieerig Uiversity of Hawaiʻi at Māoa Combiatioal Logic Blocks Multiplexer Ecoders/Decoders

More information

AN OPTIMIZATION NETWORK FOR MATRIX INVERSION

AN OPTIMIZATION NETWORK FOR MATRIX INVERSION 397 AN OPTIMIZATION NETWORK FOR MATRIX INVERSION Ju-Seog Jag, S~ Youg Lee, ad Sag-Yug Shi Korea Advaced Istitute of Sciece ad Techology, P.O. Box 150, Cheogryag, Seoul, Korea ABSTRACT Iverse matrix calculatio

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a 4. [10] Usig a combiatorial argumet, prove that for 1: = 0 = Let A ad B be disjoit sets of cardiality each ad C = A B. How may subsets of C are there of cardiality. We are selectig elemets for such a subset

More information

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design

COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 4. The Processor. Part A Datapath Design COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter The Processor Part A path Desig Itroductio CPU performace factors Istructio cout Determied by ISA ad compiler. CPI ad

More information

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 5. Functions for All Subtasks. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 5 Fuctios for All Subtasks Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 5.1 void Fuctios 5.2 Call-By-Referece Parameters 5.3 Usig Procedural Abstractio 5.4 Testig ad Debuggig

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

The Value of Peering

The Value of Peering The Value of Peerig ISP/IXP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 25 th

More information

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The

More information

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute

More information

Hashing Functions Performance in Packet Classification

Hashing Functions Performance in Packet Classification Hashig Fuctios Performace i Packet Classificatio Mahmood Ahmadi ad Stepha Wog Computer Egieerig Laboratory Faculty of Electrical Egieerig, Mathematics ad Computer Sciece Delft Uiversity of Techology {mahmadi,

More information

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size

Markov Chain Model of HomePlug CSMA MAC for Determining Optimal Fixed Contention Window Size Markov Chai Model of HomePlug CSMA MAC for Determiig Optimal Fixed Cotetio Widow Size Eva Krimiger * ad Haiph Latchma Dept. of Electrical ad Computer Egieerig, Uiversity of Florida, Gaiesville, FL, USA

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

How do we evaluate algorithms?

How do we evaluate algorithms? F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:

More information

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i

More information

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard 1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

Computer Graphics Hardware An Overview

Computer Graphics Hardware An Overview Computer Graphics Hardware A Overview Graphics System Moitor Iput devices CPU/Memory GPU Raster Graphics System Raster: A array of picture elemets Based o raster-sca TV techology The scree (ad a picture)

More information

A Parallel DFA Minimization Algorithm

A Parallel DFA Minimization Algorithm A Parallel DFA Miimizatio Algorithm Ambuj Tewari, Utkarsh Srivastava, ad P. Gupta Departmet of Computer Sciece & Egieerig Idia Istitute of Techology Kapur Kapur 208 016,INDIA pg@iitk.ac.i Abstract. I this

More information

An Improvement of the Basic El-Gamal Public Key Cryptosystem

An Improvement of the Basic El-Gamal Public Key Cryptosystem Iteratioal Joural of Computer Applicatios Techology ad Research A Improvemet of the Basic El-Gamal Public Key Cryptosystem W.D.M.G.M. Dissaayake (PG/MPhil/2015/09 Departmet of Computer Egieerig Faculty

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved.

Introduction to Wireless & Mobile Systems. Chapter 6. Multiple Radio Access Cengage Learning Engineering. All Rights Reserved. Itroductio to Wireless & Mobile Systems Chapter 6 Multiple Radio Access 1 Outlie Itroductio Multiple Radio Access Protocols Cotetio-based Protocols Pure ALOHA Slotted ALOHA CSMA (Carrier Sese Multiple

More information

Algorithms Chapter 3 Growth of Functions

Algorithms Chapter 3 Growth of Functions Algorithms Chapter 3 Growth of Fuctios Istructor: Chig Chi Li 林清池助理教授 chigchi.li@gmail.com Departmet of Computer Sciece ad Egieerig Natioal Taiwa Ocea Uiversity Outlie Asymptotic otatio Stadard otatios

More information

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1 Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access

More information

Baan Finance Financial Statements

Baan Finance Financial Statements Baa Fiace Fiacial Statemets Module Procedure UP041A US Documetiformatio Documet Documet code : UP041A US Documet group : User Documetatio Documet title : Fiacial Statemets Applicatio/Package : Baa Fiace

More information

The Research Based on Fuzzy Sliding Mode Control for Linear Double. Inverted Pendulum

The Research Based on Fuzzy Sliding Mode Control for Linear Double. Inverted Pendulum Advaced Materials Research Olie: 04-05-3 ISSN: 66-8985, Vols. 96-930, pp 463-467 doi:0.408/www.scietific.et/amr.96-930.463 04 Tras Tech Publicatios, Switzerlad The Research Based o Fuzzy Slidig Mode Cotrol

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

THE WAY OF CALCULATING THE TRAFFIC AND SIGNALING NETWORK DIMENSION OF COMMON CHANNEL SIGNALING NO.7 (CCS7)

THE WAY OF CALCULATING THE TRAFFIC AND SIGNALING NETWORK DIMENSION OF COMMON CHANNEL SIGNALING NO.7 (CCS7) The Way of Calculatig The Traffic... THE WAY OF CALCULATIG THE TRAFFIC AD SIGALIG ETWORK DIMESIO OF COMMO CHAEL SIGALIG O.7 (CCS7) Departeme Tekik Elektro, Fakultas Tekik, Uiversitas Sumatera Utara Abstract:

More information

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis Extedig The Sleuth Kit ad its Uderlyig Model for Pooled File System Foresic Aalysis Frauhofer Istitute for Commuicatio, Iformatio Processig ad Ergoomics Ja-Niclas Hilgert* Marti Lambertz Daiel Plohma ja-iclas.hilgert@fkie.frauhofer.de

More information

Neural Networks A Model of Boolean Functions

Neural Networks A Model of Boolean Functions Neural Networks A Model of Boolea Fuctios Berd Steibach, Roma Kohut Freiberg Uiversity of Miig ad Techology Istitute of Computer Sciece D-09596 Freiberg, Germay e-mails: steib@iformatik.tu-freiberg.de

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998 Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 0 April 18, 1998 % Su Logo for Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza Drive Colorado

More information

% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995

% Sun Logo for Frame. X3T10/95-229, Revision 2. September 28, 1995 Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 2 September 28, 1995 % Su Logo for Frame Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza

More information

IXS-6600-C IXS-6700-C

IXS-6600-C IXS-6700-C INTEGRATED ROUTING SYSTEM PACK IXS-6600-C IXS-6700-C INTEGRATED ROUTING SYSTEM IXS-6600 IXS-6700 IKS-6030M IKS-A6011 IKS-A6015 IKS-A6050 IKS-A6061 IKS-V6010M IKS-V6010SD IKS-V6050M IKS-V6050SD IKS-V6060M

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

History Based Probabilistic Backoff Algorithm

History Based Probabilistic Backoff Algorithm America Joural of Egieerig ad Applied Scieces, 2012, 5 (3), 230-236 ISSN: 1941-7020 2014 Rajagopala ad Mala, This ope access article is distributed uder a Creative Commos Attributio (CC-BY) 3.0 licese

More information

Architectural styles for software systems The client-server style

Architectural styles for software systems The client-server style Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS

More information