A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

Size: px
Start display at page:

Download "A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE"

Transcription

1 A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs and Statstcs, Zhengzhou Normal Unversty E-mal: 1 lutao770910@126.com ABSTRACT The peer-to-peer network s based on locaton mechansm of dstrbuted obects, whch s conducve to sharng of resources among users. The commonly usng overlay network topology method based on nterestng group n the exstng peer-to-peer network should be accomplshed collaboratvely by users, whch ncreases system traffc and occupes large bandwdth. The paper brought out a knd of routng model n peer-to-peer network based on Successful Accessng Rate (SAR). The model organzes user group based on SAR and conductng resource searchng n the hgh-low order of SAR. In the model, each node runs ndependently, whch decrease system mantenance cost and provdes new dea to solve free-rder problem. Smulaton results show that the model effectvely mprove recall rate of system and also solve farness problem. Keywords: Peer-To-Peer Network, Routng; Successful Accessng Rate 1. INTRODUCTION The emergency of peer-to-peer (P2P) network comes from requrements of users on sharng and adequately usage of Internet resources. The most promnent character of P2P network s that users share resources drectly, the core of whch s postonng mechansm of dstrbuted obects. There are several routng methods currently as followng. The frst s centralzed ndexng manner as Napster system [1]. It has problems of sngle pont falure as well as performance bottlenecks, so t cannot be appled n large-scale network. The second s structural P2P system based on dstrbuted Hash table DHT, such as Chord and CAN systems [2, 3]. It can acheves hgh effcency searchng but only support searchng based on accurate obect key value and lack of fuzzy searchng ablty. It also does not support complex ndexng based on semantc. On the contrary, unstructured P2P network as Gnutella [4-7] can better support varous forms of nformaton ndexng. However, the searchng strategy based on floodng or random roar ncrease messages on P2P network, whch restrcts scalablty of P2P network. In order to mprove routng performance of unstructured P2P network, the method to construct overlay topology based on nterest group s manly used now [8-10]. Its man bass s that nodes wth same nterest has common request on resources and storage. The users wth same nterests are lnked together by overlay network. In the searchng, t s easer to fnd resources meet requrements n local nterest group so as to mprove successful rate for resource postonng. The constructon of overlay network based on nterest group needs users publsh own nterest or more specfc fle character n the network, and then establsh nterest group by ndexng or self-organzaton. We can see that the method can only be accomplshed by cooperaton among users, whch ncreases system communcaton amount and occupes large bandwdth. The successful accessng rate-based (SARB) peer-to-peer network routng model n ths paper organzes based on node SAR. It looks for resource n the hgh-low order of successful accessng rate. Nodes n the model operate ndependently, whch decreases system mantan cost and provde new dea to solve free-rder problem. Smulaton results show that the model can effectvely mprove system recall and better solve system far problem at the same tme. The paper s organzed as follows: secton 2 descrbes SARB model; secton 3 gves specfc SARB algorthm; secton 4 conduct performance analyss and smulaton on SARB; secton 5 concludes our work. 275

2 2. SARB MODEL DESCRIPTION The startng pont of SARB s that more tmes of node storage resources been successfully accessed, the node has hgher SAR. Other nodes have hgher probablty to fnd needed resources on ths node. Therefore, organze nodes wth smlar successful accessng rate n the system together. In case of searchng, frstly access to node wth larger SAR so that the resource recall ncreases. Assume there are N nodes n the system marked as P1, P2,, PN. Use D to represent successful accessng rate of node P, the ntal value of D s 0. In the system operaton process, other nodes P (0 N, ) successfully access resources from node P, then D ncreases correspondngly. Dvde node successful accessng rate nto K levels 0,1,, K 1 based on value. The boundary value 0 1 K 1 s D, D,, D m m 1. If D D < D +, d s the m- th level and d = dd ( ) = m. Usng T as tme nterval, compute current successful accessng rate D of current node P and determne ts level. To facltate descrpton, the cyclc structure s used as basc structure of SARB. After node enters nto system, assgn a node sgn for each one to dentfy t unquely. Takng node as example, when the node enters nto system, t uses the manner of normal cyclc structure. At ntervals of tme T, compute successful accessng rate D of node at current tme and dvde ts level. Here we assure level d s m. Fnd nodes n the system. If there s other nodes whose successful accessng rate level s m, the node also enter nto cyclc structure of ths level. In ths way, each node actually has two logc postons n the system. It also has two routng selecton nformaton. The fnal structural dagram s shown n Fg. 1. 1' 0,d 0=1 4,d 4=3 6,d 6=4 7,d 7=4 1,d 1=1 2,d 2=3 3' 4' 3,d 3 =3 0,d 0 =1 1,d 1 =1 d=0 2,d 2 =3 6,d 6=4 7' 5,d 4=2 5,d 5 =2 3,d 3=3 7,d 7=4 4,d 4=3 Fgure 1: SARB logcal structure wth cyclc structure As shown n Fg. 1 n the system wth 8 nodes, the successful accessng rate level where node 5 locates only has the node tself, whle node (0, 1), (2, 3, 4) and (6, 7) respectvely belong to same successful accessng rate. 1, 2,3,7 respectvely represent another logcal poston of node 1,2,3 and node SARB ROUTING ALGORITHM 3.1 Routng Table Structure Each node n the SARB model keeps two sets of routng nformaton. One s routng nformaton of node n the whole system, whch s called system routng table. Another s routng nformaton of successful accessng rate level where the node locates, whch s called level routng table. The system routng table should add an tem to represent successful accessng rate level of the tem successor. In addton, the successor n system routng table tem s not the frst exstng node of ths area, but the node most closely to node sgn wth maxmum successful accessng rate level and the node dentfer closest node. The routng table structure of node 0 n Fg. 1 s shown n Table

3 nt. [1, 2) [2, 4) [4, 0) Table 1: Routng table structure of node 0 n Fg. 1 System routng table (fnger table) succ Level routng table (fnger table) d=1 [1, 0) 1 d d 1 =1 d 2 =3 d 6 =4 3.2 Node Status Changes The node poston n system of SARB model s determned commonly by node dentfer and node successful accessng rate level. The node dentfer wll no longer change after node enters system, whle node successful accessng rate dynamcally change accordng to response of node on other nodes and then perodcally conduct level transton. Therefore, the node status change n system manly ncludes three knds of on, leave as well as successful accessng level transton. Here these three statuses are descrbed as followng Identfcaton of subsectons Step1: Determne own node dentfer that assumed to be p. Step2: contact wth another member node p n the system. The node wll act as bootstrap node of new oned node p. Step3: The node p ntates lookng for node p and fnd the node whose dentfer only below than p as ts prevous node. Step4: Intate system routng table of p. The node successful accessng rate level d p =0. Step5: Update system routng table of related nodes needed for modfcaton because of on of p. Under crcumstance of system node number N, the node number should be updated s O(log N ). Step6: Based on own system routng table, the node p fnd nodes wth same successful accessng rate level and on level cyclc structure to construct level routng table Process of node leaves system Assumed node dentfer p, and the level of successful accessng rate d p =m. Step1: Conduct leavng operaton accordng to level routng table n the cyclc structure whose successful accessng rate level s m. Update level routng tables of other related nodes correspondngly. Step2: Complete leavng operaton accordng to system routng table n the system and update system routng tables of related nodes correspondngly Process of node level transton Assume p s the current node and successful accessng level d p =m. The level to be transted s d = n. ' p Step1: Conduct leavng operaton accordng to level routng table n the cyclc structure whose successful accessng rate level s m. Update level routng tables of other related nodes correspondngly. Step2: Modfy successful accessng rate level of node p to n. Step3: Update system routng tables of related nodes correspondngly. In the Fg. 1, assume node successful accessng rate level of node 7 transts from level 4 to level 5, then routng table update of node 0 updates as Table 2 shows. Step4: The node p fnds nodes whose successful accessng rate level s n accordng to own system routng table. Jon ths level cyclc structure and buld level routng table. 3.3 Routng Algorthm The basc dea of SARB routng algorthm s as followng. Source node send query message wth ntal TTL value to network. Frstly send message to node wth hghest successful accessng rate level accordng to system routng table. Then search n the same level based on level routng table, and 277

4 return query result to source node after found correspondng target. nt. [1, 2) [2, 4) [4, 0) Table 2: Routng table of node 0 after node 7 transt level System routng table (fnger table) succ Level routng table (fnger table) d=1 [1, 0) 1 d d 1 =1 d 2 =3 d 6 =5 As the node system routng table stores nodes wth hghest successful accessng rate level n the whole system area, the system routng table of node sendng request can fnd the node wth hghest Algorthm 1 successful accessng rate level n the system. Therefore, t only needs one step from source node to node cluster wth hghest successful accessng rate level. The algorthm s shown n Fg. 2. Assume P s current node. Input s query message Q=query(message, Src, TTL). Where, message s query semantc descrpton; Src s query message ntate node; TTL s maxmum lfetme of ths query message. The output s target result R to Src. f (P==Src) Look for node wth maxmum level successful accessng rate n local system routng table and forward query message; else Set Q.TTL=Q.TTL-1; Execute local query, return query result to Src; f (Q.TTL>0) Send query to other nodes n same successful sccessng rate elvel wth P accordng to level routng table; end f end f From the algorthm 1 we can see that the nodes wth hghest successful accessng rate level are accessed n each tme of query, whch wll ncrease overhead of these nodes. However, the nodes wth lower level only have fewer tmes been accessed, whch also not conductve for ncrease of node level. Therefore, the paper brought out SARB routng algorthm 2. In the query process of algorthm 2, source node adds successful accessng rate level of t n the query packet. The query was carred out on same success rate level wth source node except for hghest level. The contrbuton level of routng s equal to or lower than node request from query Fgure 2: Specfc steps of algorthm 1 node. On the contrary, t can refuse the request wth certan probablty. The algorthm 2 s shown n Fg. 3. The node accepts resource request from node wth probablty pd ( ) and the probablty 1 pd ( ) to refuse the request. The computaton of probablty pd ( ) s as followng: 1 d d pd ( ) 1 = d < d λ d (1) 278

5 Assume P s current node and d p s successful accessng rate level of node P. Input s query message Q=query(message, Src, TTL, d src ). Where, message s query senmatc descrpton; Src s query message ntate node; TTL s maxmum lfetme of query message; d src s successful accessng rate level of source node. Output target result s R to Src. f (P==Src) Forward query message accordng to local level routng table; Look for node wth maxmum level successful accessng rate n local system routng table and forward query message; else set Q.TTL=Q.TTL-1; Execute local query wth probablty p(d p -d src ) and return query result to Src; f (Q.TTL>0) Send query to other nodes n same successful sccessng rate elvel wth P accordng to level routng table; end f end f Where, λ s constant coeffcent factor and ts value s n the nterval of (1, 2]. Therefore, f the successful accessng rate level d of node s small, the node wth hgher level than node lkely refuse request from node. We can see that the above two algorthms use abler way. In the algorthm 2, hgher level node can refuse response to query request for decreasng overhead. Meanwhle, t also needs to constantly mprove own level by respondng to query requests. The node wth lower level can only access to opportunty to response request of nodes n same level by sendng request, so as to ncrease successful accessng rate level. Therefore, algorthm 2 s a knd of routng algorthm wth reward mechansm. In addton, the above two knds of routng algorthms may not fnd necessary resources, whch s determned by query on resources by resource node accordng to unstructured P2P network floodng or random walk way. 3.4 Supervse Mechansm Nodes n the SARB routng algorthm automatcally compute ts own successful accessng rate and perform level transton accordng to value of success rate. When the node n algorthm 2 receves query request, t determnes whether to answer ths request from dfference between successful accessng rates from send and receve node. It may have forge behavor for node ntated query to obtan hgher response rate. In vew of ths stuaton, the successful accessng rate Algorthm 2 Fgure 3: Specfc steps of algorthm neghborhood montorng mechansm (NMM) was proposed. The man dea of NMM s to constran node behavor relayng on montorng mechansm from neghbors. The specfc descrpton s as followng. Each node keeps all neghbor statuses. The neghbor status s determned by answer stuaton of neghbor on query request, whch can be dvded nto two knds of met or un-met. The node dynamcally mantans neghbor based on recorded neghbor status. If a neghbor s n met status, normally routes t. Otherwse, unlnk connecton to ths neghbor. If all adacent nodes unlnk connectons wth ths node, t s n solated status n system. So t cannot perform queryng or routng, so as to avod forgery behavors. The method does not need large amount of nformaton nteracton among nodes n EgenTrust algorthm. Furthermore, dynamc changng feature of node successful accessng rate level enable neghbor nodes not easly form colluson. It s smple for mplementaton and has good scalablty [11-13]. 4. PERFORMANCE ANALYSIS 4.1 Evaluaton Indexes The paper uses followng two ndexes to evaluate ts semantc query performance, namely recall T(Q) and average message number generated n queryng. Recall s the proporton of searched documents number met condtons n all related documents, the formula of whch s as follows:

6 Dgetcorrect TQ ( ) = (2) D Where, D total s set of all related documents dstrbuted on P2P network amng at some query; D getcorrect s the actually obtaned document set. The quered average message number M means average generated message number n the propagaton process on P2P network. Its sze determnes network overhead change caused by query operaton, whch s mportant ndex to measure network structure. 4.2 Algorthm Analyss Assume there are N nodes n the system that marked as P1, P2,, PN. The node successful accessng rate level can be dvded nto K levels (0,1,, K 1) accordng to value. The successful accessng rate level of node P d =m. The node number n ths level s num(m). The hghest level of node successful accessng rate level n current system s n. Node number n ths level s num(n). When the node P ntate query Q, the average message number generated by queres by algorthm 1 s M = 1 + log(num( n)). In the algorthm 2, the average message number generated by queres s M = 1 + log(num( n)) + log(num( m)). We can see that the average query message number s larger than that of algorthm 1. total Clearly, the routng algorthm under SARB structure s sgnfcantly lower than floodng mechansm n Gnutella n the aspect of query average message number. 4.3 Performance Smulaton In the smulaton experment, GT-ITM topology generator was used to generate random network topology. The transt-stub (TS) model that s more representatve of Internet structure was also used. Network node sze s Dstrbute documents for each node accordng to Zpf dstrbuton wth parameter α =1.2. The requred resources n query also ntates accordng to Zpf dstrbuton wth parameter α =1.2. Assume each node has at most 100 documents n the test. All the results are average value under tmes of queres. The comparson of recall between two algorthms and Gnutella wth dfferent TTL s shown n Fg. 4. From the fgure we can see that the recall of algorthm s bgger than that of algorthm 1 n lower TTL value as t use the strategy that synchronous query of own level wth hghest level. However, wth ncrease of TTL value, as algorthm 2 has stuaton that hgh level refuse to access lower level servce, the recall s lower than that of algorthm 1. Under crcumstance of TTL<6, the routng algorthm based on SARB structure proposed n the paper s sgnfcantly hgher than Gnutella, whch shows ts superorty. 5. CONCLUSION Fgure 4: Comparson of recall n algorthms under dfferent TTL condtons In order to mprove routng performance of unstructured P2P network, the method to construct overlay topology based on nterest group s manly used now. The method can only be accomplshed 280 by cooperaton among users, whch ncreases system communcaton amount and occupes large bandwdth. The peer-to-peer network routng model SARB based on successful accessng rate ust organze nodes wth smlar successful accessng rate together. It s frstly conducted n nodes wth larger successful accessng rate so that the resource

7 recall can be ncreased. The paper also gves basc structure of SARB as well as node status mantenance and two knds of routng algorthm. Smulaton experments show that ths structure can sgnfcantly mprove recall under smaller TTL compared wth Gnutella. REFRENCES: [1] Morrs R., Lben-Nowell D., Karger D. R., Kaashoek M. F., Dabek F., Balakrshnan H., Chord: a scalable peer-to-peer lookup protocol for Internet applcatons, IEEE/ACM Transactons on Networkng, Vol. 11, No. 1, 2003, pp [2] Sylva Ratnasamy, Paul Francs, Mark Handley, Rchard Karp, Scott Shenker, A scalable content addressable network, In Proceedngs of ACM SIGCOMM, 2001, pp [3] Chrstos Gkantsds, Mlena Mhal, Amn Saber, Random walks n peer-to-peer networks, In Proceedngs of IEEE INFOCOM, 2004, pp [4] Arturo Crespo, Hector Garca, Random walks n peer-to-peer networks, In Proceedngs of the Thrd nternatonal conference on Agents and Peer-to-Peer Computng, 2004, pp [5] Sepandar D. Kamvar, Maro T. Schlosser, Hector Garca-Molna, The egentrust algorthm for reputaton management n P2P networks, In Proceedngs of the 12th nternatonal conference on World Wde Web, 2003, pp [6] Wang Yan-lang, Research on Small World Model n P2P Networks, Advances n Informaton Scences and Servce Scences, Vol. 4, No. 2, 2012, pp [7] Sh-dong Zhang, Geng-yu We, Ba Wang, Deyu Yuan, An Optmzaton Method for P2P Resource Schedulng, Internatonal Journal of Dgtal Content Technology and ts Applcatons, Vol. 6, No. 4, 2012, pp [8] Chuan Xu, Hong Tang, CongCong Xng, P2P Traffc Localzaton Based on Peer-Lst Cachng, Internatonal Journal of Advancements n Computng Technology, Vol. 4, No. 5, 2012, pp [9] Zhenlng Wang, A Novel Peer to Peer Traffc Identfcaton Approach based on Hybrd Feature Selecton Algorthm, Internatonal Journal of Dgtal Content Technology and ts Applcatons, Vol. 6, No. 8, 2012, pp [10] Hung-Wen Yang, Chou-Chen Yang, Y-Ju Ln, Woe Ln, A Novel Authorzed Fle-Sharng Protocol for P2P Networks, Advances n Informaton Scences and Servce Scences, Vol. 4, No. 8, 2012, pp [11] Zhgang Chen, Lmao L, Jngsong Gu, Fuzzy Theory for the P2P Subect Trust Evaluaton Model, Internatonal Journal of Advancements n Computng Technology, Vol. 4, No. 8, 2012, pp [12] Jaq Lu, Zhgang Chen, Deng L, Zhong Ren, RELO: a Robust, Effcent and Low-cost Peerto-Peer Overlay for Autonomc Communcaton, Internatonal Journal of Advancements n Computng Technology, Vol. 4, No. 6, 2012, pp [13] Ju-Yn Chuang, Pe-Lng Hsu, Y-Shn Chen, Improvng Broadcast Processes n Peer-to-Peer Systems, Advances n Informaton Scences and Servce Scences, Vol. 4, No. 8, 2012, pp

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Federated Search of Text-Based Digital Libraries in Hierarchical Peer-to-Peer Networks

Federated Search of Text-Based Digital Libraries in Hierarchical Peer-to-Peer Networks Federated Search of Text-Based Dgtal Lbrares n Herarchcal Peer-to-Peer Networks Je Lu School of Computer Scence Carnege Mellon Unversty Pttsburgh, PA 15213 jelu@cs.cmu.edu Jame Callan School of Computer

More information

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems Real-tme Fault-tolerant Schedulng Algorthm for Dstrbuted Computng Systems Yun Lng, Y Ouyang College of Computer Scence and Informaton Engneerng Zheang Gongshang Unversty Postal code: 310018 P.R.CHINA {ylng,

More information

Selective Flooding Based on Relevant Nearest-Neighbor using Query Feedback and Similarity across Unstructured Peer-to-Peer Networks

Selective Flooding Based on Relevant Nearest-Neighbor using Query Feedback and Similarity across Unstructured Peer-to-Peer Networks Journal of Computer Scence 5 (3):184-190, 009 ISSN 1549-3636 009 Scence Publcatons Selectve Floodng Based on Relevant Nearest-Neghbor usng Query Feedback and Smlarty across Unstructured Peer-to-Peer Networks

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI 216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS

AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS Lngku Meng a, Wenun Xe a, *, Dan Lu a, b a School of Remote Sensng and Informaton Engneerng, Wuhan Unversty, Wuhan 4379,

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

A Low Energy Algorithm of Wireless Sensor Networks Based on Fractal Dimension

A Low Energy Algorithm of Wireless Sensor Networks Based on Fractal Dimension Sensors & Transducers 2014 by IFSA Publshng, S. L. http://www.sensorsportal.com A Low Energy Algorthm of Wreless Sensor Networks ased on Fractal Dmenson Tng Dong, Chunxao Fan, Zhgang Wen School of Electronc

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

BIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING

BIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING An Improved K-means Algorthm based on Cloud Platform for Data Mnng Bn Xa *, Yan Lu 2. School of nformaton and management scence, Henan Agrcultural Unversty, Zhengzhou, Henan 450002, P.R. Chna 2. College

More information

Gateway Algorithm for Fair Bandwidth Sharing

Gateway Algorithm for Fair Bandwidth Sharing Algorm for Far Bandwd Sharng We Y, Rupnder Makkar, Ioanns Lambadars Department of System and Computer Engneerng Carleton Unversty 5 Colonel By Dr., Ottawa, ON KS 5B6, Canada {wy, rup, oanns}@sce.carleton.ca

More information

Professional competences training path for an e-commerce major, based on the ISM method

Professional competences training path for an e-commerce major, based on the ISM method World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Future Generation Computer Systems

Future Generation Computer Systems Future Generaton Computer Systems 29 (2013) 1631 1644 Contents lsts avalable at ScVerse ScenceDrect Future Generaton Computer Systems journal homepage: www.elsever.com/locate/fgcs Gosspng for resource

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Research Article Information Transmission Probability and Cache Management Method in Opportunistic Networks

Research Article Information Transmission Probability and Cache Management Method in Opportunistic Networks Wreless Communcatons and Moble Computng Volume 2018, Artcle ID 1571974, 9 pages https://do.org/10.1155/2018/1571974 Research Artcle Informaton Transmsson Probablty and Cache Management Method n Opportunstc

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Mining User Similarity Using Spatial-temporal Intersection

Mining User Similarity Using Spatial-temporal Intersection www.ijcsi.org 215 Mnng User Smlarty Usng Spatal-temporal Intersecton Ymn Wang 1, Rumn Hu 1, Wenhua Huang 1 and Jun Chen 1 1 Natonal Engneerng Research Center for Multmeda Software, School of Computer,

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

A Fair MAC Algorithm with Dynamic Priority for e WLANs

A Fair MAC Algorithm with Dynamic Priority for e WLANs 29 Internatonal Conference on Communcaton Software and Networks A Far MAC Algorthm wth Dynamc Prorty for 82.e WLANs Rong He, Xumng Fang Provncal Key Lab of Informaton Codng & Transmsson, Southwest Jaotong

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

Music Information Retrieval Schemes in Peer-to-Peer Environments

Music Information Retrieval Schemes in Peer-to-Peer Environments Journal of Computer Scence 1 (3): 369-375, 2005 ISSN 1549-3636 Scence Publcatons, 2005 Musc Informaton Retreval Schemes n Peer-to-Peer Envronments Chaokun Wang, Janzhong L and Shengfe Sh School of Computer

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

BRDPHHC: A Balance RDF Data Partitioning Algorithm based on Hybrid Hierarchical Clustering

BRDPHHC: A Balance RDF Data Partitioning Algorithm based on Hybrid Hierarchical Clustering 015 IEEE 17th Internatonal Conference on Hgh Performance Computng and Communcatons (HPCC), 015 IEEE 7th Internatonal Symposum on Cyberspace Safety and Securty (CSS), and 015 IEEE 1th Internatonal Conf

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Application of VCG in Replica Placement Strategy of Cloud Storage

Application of VCG in Replica Placement Strategy of Cloud Storage Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng

More information

Popularity and gain based caching scheme for information-centric networks

Popularity and gain based caching scheme for information-centric networks Research Artcle Internatonal Journal of Advanced Computer Research, Vol 7(30) ISSN (Prnt): 2249-7277 ISSN (Onlne): 2277-7970 http://dx.do.org/10.19101/ijacr.2017.730015 Popularty and gan based cachng scheme

More information

A New Approach For the Ranking of Fuzzy Sets With Different Heights

A New Approach For the Ranking of Fuzzy Sets With Different Heights New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like:

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like: Self-Organzng Maps (SOM) Turgay İBRİKÇİ, PhD. Outlne Introducton Structures of SOM SOM Archtecture Neghborhoods SOM Algorthm Examples Summary 1 2 Unsupervsed Hebban Learnng US Hebban Learnng, Cntd 3 A

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

Efficient Broadcast Disks Program Construction in Asymmetric Communication Environments

Efficient Broadcast Disks Program Construction in Asymmetric Communication Environments Effcent Broadcast Dsks Program Constructon n Asymmetrc Communcaton Envronments Eleftheros Takas, Stefanos Ougaroglou, Petros copoltds Department of Informatcs, Arstotle Unversty of Thessalonk Box 888,

More information

Quantifying Responsiveness of TCP Aggregates by Using Direct Sequence Spread Spectrum CDMA and Its Application in Congestion Control

Quantifying Responsiveness of TCP Aggregates by Using Direct Sequence Spread Spectrum CDMA and Its Application in Congestion Control Quantfyng Responsveness of TCP Aggregates by Usng Drect Sequence Spread Spectrum CDMA and Its Applcaton n Congeston Control Mehd Kalantar Department of Electrcal and Computer Engneerng Unversty of Maryland,

More information

Sorting. Sorted Original. index. index

Sorting. Sorted Original. index. index 1 Unt 16 Sortng 2 Sortng Sortng requres us to move data around wthn an array Allows users to see and organze data more effcently Behnd the scenes t allows more effectve searchng of data There are MANY

More information

A fair buffer allocation scheme

A fair buffer allocation scheme A far buffer allocaton scheme Juha Henanen and Kalev Klkk Telecom Fnland P.O. Box 228, SF-330 Tampere, Fnland E-mal: juha.henanen@tele.f Abstract An approprate servce for data traffc n ATM networks requres

More information

International Journal of Applied Mathematics and Soft Computing

International Journal of Applied Mathematics and Soft Computing Internatonal Journal of Appled Mathematcs and Soft Computng -------------------------------------------------------------------------------- Presdent: Zhang Jnrong Chef Planner: Hu Yuejuan Executve Chef

More information

TTEM: An Effective Trust-Based Topology Evolution Mechanism for P2P Networks

TTEM: An Effective Trust-Based Topology Evolution Mechanism for P2P Networks JOURNAL OF COMMUNICAIONS, VOL. 3, NO. 7, DECEMBER 2008 3 EM: An Effectve rust-based opology Evoluton Mechansm for P2P Networks Janl Hu Insttute of Networks & Informaton Securty, School of Computer, Natonal

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

Wireless Sensor Network Localization Research

Wireless Sensor Network Localization Research Sensors & Transducers 014 by IFSA Publshng, S L http://wwwsensorsportalcom Wreless Sensor Network Localzaton Research Lang Xn School of Informaton Scence and Engneerng, Hunan Internatonal Economcs Unversty,

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

Capability-Aware Object Management based on Skip List in Large-Scale Heterogeneous P2P Networks

Capability-Aware Object Management based on Skip List in Large-Scale Heterogeneous P2P Networks Takash Tommoto, Takuj Tachbana, Kenj Sugmoto Capablty-ware Object Management based on Skp Lst n Large-Scale Heterogeneous PP Networks TKSHI TOMIMOTO, TKUJI TCHIBN, KENJI SUGIMOTO Graduate School of Informaton

More information

Energy efficient prediction clustering algorithm for multilevel heterogeneous wireless sensor networks

Energy efficient prediction clustering algorithm for multilevel heterogeneous wireless sensor networks Abstract: nergy effcent predcton clusterng algorthm for multlevel heterogeneous wreless sensor networks Tang Lu a,b,c,* Jan Peng b,c Jn Yang d Chunl Wang e a College of Fundamental ducaton, Schuan Normal

More information

A Novel Distributed Collaborative Filtering Algorithm and Its Implementation on P2P Overlay Network*

A Novel Distributed Collaborative Filtering Algorithm and Its Implementation on P2P Overlay Network* A Novel Dstrbuted Collaboratve Flterng Algorthm and Its Implementaton on P2P Overlay Network* Peng Han, Bo Xe, Fan Yang, Jajun Wang, and Rumn Shen Department of Computer Scence and Engneerng, Shangha Jao

More information

A Distributed Dynamic Bandwidth Allocation Algorithm in EPON

A Distributed Dynamic Bandwidth Allocation Algorithm in EPON www.ccsenet.org/mas Modern Appled Scence Vol. 4, o. 7; July 2010 A Dstrbuted Dynamc Bandwdth Allocaton Algorthm n EPO Feng Cao, Demng Lu, Mnmng Zhang, Kang Yang & Ynbo Qan School of Optoelectronc Scence

More information

A CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION

A CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION A CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION 1 FENG YONG, DANG XIAO-WAN, 3 XU HONG-YAN School of Informaton, Laonng Unversty, Shenyang Laonng E-mal: 1 fyxuhy@163.com, dangxaowan@163.com, 3 xuhongyan_lndx@163.com

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling , pp.40-45 http://dx.do.org/10.14257/astl.2017.143.08 Applcaton of Improved Fsh Swarm Algorthm n Cloud Computng Resource Schedulng Yu Lu, Fangtao Lu School of Informaton Engneerng, Chongqng Vocatonal Insttute

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

Routability Driven Modification Method of Monotonic Via Assignment for 2-layer Ball Grid Array Packages

Routability Driven Modification Method of Monotonic Via Assignment for 2-layer Ball Grid Array Packages Routablty Drven Modfcaton Method of Monotonc Va Assgnment for 2-layer Ball Grd Array Pacages Yoch Tomoa Atsush Taahash Department of Communcatons and Integrated Systems, Toyo Insttute of Technology 2 12

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

WITH rapid improvements of wireless technologies,

WITH rapid improvements of wireless technologies, JOURNAL OF SYSTEMS ARCHITECTURE, SPECIAL ISSUE: HIGHLY-RELIABLE CPS, VOL. 00, NO. 0, MONTH 013 1 Adaptve GTS Allocaton n IEEE 80.15.4 for Real-Tme Wreless Sensor Networks Feng Xa, Ruonan Hao, Je L, Naxue

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(10): Research Article. Study on the original page oriented load balancing strategy

Journal of Chemical and Pharmaceutical Research, 2014, 6(10): Research Article. Study on the original page oriented load balancing strategy Avalable onlne www.jocpr.com Journal of hemcal and Pharmaceutcal Research, 2014, 6(10):274-280 Research Artcle IN : 0975-7384 ODEN(UA) : JPR5 tudy on the orgnal page orented load balancng strategy Kunpeng

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Behavioral Model Extraction of Search Engines Used in an Intelligent Meta Search Engine

Behavioral Model Extraction of Search Engines Used in an Intelligent Meta Search Engine Behavoral Model Extracton of Search Engnes Used n an Intellgent Meta Search Engne AVEH AVOUSI Computer Department, Azad Unversty, Garmsar Branch BEHZAD MOSHIRI Electrcal and Computer department, Faculty

More information

Effectiveness of Information Retraction

Effectiveness of Information Retraction Effectveness of Informaton on Cndy Hu, Malk Magdon-Ismal, Mark Goldberg and Wllam A. Wallace Department of Industral and Systems Engneerng Rensselaer Polytechnc Insttute Troy, New York Emal: huc@rp.edu,

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Distributed Middlebox Placement Based on Potential Game

Distributed Middlebox Placement Based on Potential Game Int. J. Communcatons, Network and System Scences, 2017, 10, 264-273 http://www.scrp.org/ournal/cns ISSN Onlne: 1913-3723 ISSN Prnt: 1913-3715 Dstrbuted Mddlebox Placement Based on Potental Game Yongwen

More information

A Frame Packing Mechanism Using PDO Communication Service within CANopen

A Frame Packing Mechanism Using PDO Communication Service within CANopen 28 A Frame Packng Mechansm Usng PDO Communcaton Servce wthn CANopen Mnkoo Kang and Kejn Park Dvson of Industral & Informaton Systems Engneerng, Ajou Unversty, Suwon, Gyeongg-do, South Korea Summary The

More information

Resource Discovery in P2P Networks Using Evolutionary Neural Networks

Resource Discovery in P2P Networks Using Evolutionary Neural Networks > PAPER IDENTIFICATION NUMBER: 067-04 < Resource Dscovery n P2P Networks Usng Evolutonary Neural Networks Mkko A. VAPA, Nko P. KOTILAINEN, Annemar K. AUVINEN, Hekk M. KAINULAINEN, and Jarkko T. VUORI Abstract--

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,

More information