A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE
|
|
- Pauline Martina White
- 6 years ago
- Views:
Transcription
1 A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs and Statstcs, Zhengzhou Normal Unversty E-mal: 1 lutao770910@126.com ABSTRACT The peer-to-peer network s based on locaton mechansm of dstrbuted obects, whch s conducve to sharng of resources among users. The commonly usng overlay network topology method based on nterestng group n the exstng peer-to-peer network should be accomplshed collaboratvely by users, whch ncreases system traffc and occupes large bandwdth. The paper brought out a knd of routng model n peer-to-peer network based on Successful Accessng Rate (SAR). The model organzes user group based on SAR and conductng resource searchng n the hgh-low order of SAR. In the model, each node runs ndependently, whch decrease system mantenance cost and provdes new dea to solve free-rder problem. Smulaton results show that the model effectvely mprove recall rate of system and also solve farness problem. Keywords: Peer-To-Peer Network, Routng; Successful Accessng Rate 1. INTRODUCTION The emergency of peer-to-peer (P2P) network comes from requrements of users on sharng and adequately usage of Internet resources. The most promnent character of P2P network s that users share resources drectly, the core of whch s postonng mechansm of dstrbuted obects. There are several routng methods currently as followng. The frst s centralzed ndexng manner as Napster system [1]. It has problems of sngle pont falure as well as performance bottlenecks, so t cannot be appled n large-scale network. The second s structural P2P system based on dstrbuted Hash table DHT, such as Chord and CAN systems [2, 3]. It can acheves hgh effcency searchng but only support searchng based on accurate obect key value and lack of fuzzy searchng ablty. It also does not support complex ndexng based on semantc. On the contrary, unstructured P2P network as Gnutella [4-7] can better support varous forms of nformaton ndexng. However, the searchng strategy based on floodng or random roar ncrease messages on P2P network, whch restrcts scalablty of P2P network. In order to mprove routng performance of unstructured P2P network, the method to construct overlay topology based on nterest group s manly used now [8-10]. Its man bass s that nodes wth same nterest has common request on resources and storage. The users wth same nterests are lnked together by overlay network. In the searchng, t s easer to fnd resources meet requrements n local nterest group so as to mprove successful rate for resource postonng. The constructon of overlay network based on nterest group needs users publsh own nterest or more specfc fle character n the network, and then establsh nterest group by ndexng or self-organzaton. We can see that the method can only be accomplshed by cooperaton among users, whch ncreases system communcaton amount and occupes large bandwdth. The successful accessng rate-based (SARB) peer-to-peer network routng model n ths paper organzes based on node SAR. It looks for resource n the hgh-low order of successful accessng rate. Nodes n the model operate ndependently, whch decreases system mantan cost and provde new dea to solve free-rder problem. Smulaton results show that the model can effectvely mprove system recall and better solve system far problem at the same tme. The paper s organzed as follows: secton 2 descrbes SARB model; secton 3 gves specfc SARB algorthm; secton 4 conduct performance analyss and smulaton on SARB; secton 5 concludes our work. 275
2 2. SARB MODEL DESCRIPTION The startng pont of SARB s that more tmes of node storage resources been successfully accessed, the node has hgher SAR. Other nodes have hgher probablty to fnd needed resources on ths node. Therefore, organze nodes wth smlar successful accessng rate n the system together. In case of searchng, frstly access to node wth larger SAR so that the resource recall ncreases. Assume there are N nodes n the system marked as P1, P2,, PN. Use D to represent successful accessng rate of node P, the ntal value of D s 0. In the system operaton process, other nodes P (0 N, ) successfully access resources from node P, then D ncreases correspondngly. Dvde node successful accessng rate nto K levels 0,1,, K 1 based on value. The boundary value 0 1 K 1 s D, D,, D m m 1. If D D < D +, d s the m- th level and d = dd ( ) = m. Usng T as tme nterval, compute current successful accessng rate D of current node P and determne ts level. To facltate descrpton, the cyclc structure s used as basc structure of SARB. After node enters nto system, assgn a node sgn for each one to dentfy t unquely. Takng node as example, when the node enters nto system, t uses the manner of normal cyclc structure. At ntervals of tme T, compute successful accessng rate D of node at current tme and dvde ts level. Here we assure level d s m. Fnd nodes n the system. If there s other nodes whose successful accessng rate level s m, the node also enter nto cyclc structure of ths level. In ths way, each node actually has two logc postons n the system. It also has two routng selecton nformaton. The fnal structural dagram s shown n Fg. 1. 1' 0,d 0=1 4,d 4=3 6,d 6=4 7,d 7=4 1,d 1=1 2,d 2=3 3' 4' 3,d 3 =3 0,d 0 =1 1,d 1 =1 d=0 2,d 2 =3 6,d 6=4 7' 5,d 4=2 5,d 5 =2 3,d 3=3 7,d 7=4 4,d 4=3 Fgure 1: SARB logcal structure wth cyclc structure As shown n Fg. 1 n the system wth 8 nodes, the successful accessng rate level where node 5 locates only has the node tself, whle node (0, 1), (2, 3, 4) and (6, 7) respectvely belong to same successful accessng rate. 1, 2,3,7 respectvely represent another logcal poston of node 1,2,3 and node SARB ROUTING ALGORITHM 3.1 Routng Table Structure Each node n the SARB model keeps two sets of routng nformaton. One s routng nformaton of node n the whole system, whch s called system routng table. Another s routng nformaton of successful accessng rate level where the node locates, whch s called level routng table. The system routng table should add an tem to represent successful accessng rate level of the tem successor. In addton, the successor n system routng table tem s not the frst exstng node of ths area, but the node most closely to node sgn wth maxmum successful accessng rate level and the node dentfer closest node. The routng table structure of node 0 n Fg. 1 s shown n Table
3 nt. [1, 2) [2, 4) [4, 0) Table 1: Routng table structure of node 0 n Fg. 1 System routng table (fnger table) succ Level routng table (fnger table) d=1 [1, 0) 1 d d 1 =1 d 2 =3 d 6 =4 3.2 Node Status Changes The node poston n system of SARB model s determned commonly by node dentfer and node successful accessng rate level. The node dentfer wll no longer change after node enters system, whle node successful accessng rate dynamcally change accordng to response of node on other nodes and then perodcally conduct level transton. Therefore, the node status change n system manly ncludes three knds of on, leave as well as successful accessng level transton. Here these three statuses are descrbed as followng Identfcaton of subsectons Step1: Determne own node dentfer that assumed to be p. Step2: contact wth another member node p n the system. The node wll act as bootstrap node of new oned node p. Step3: The node p ntates lookng for node p and fnd the node whose dentfer only below than p as ts prevous node. Step4: Intate system routng table of p. The node successful accessng rate level d p =0. Step5: Update system routng table of related nodes needed for modfcaton because of on of p. Under crcumstance of system node number N, the node number should be updated s O(log N ). Step6: Based on own system routng table, the node p fnd nodes wth same successful accessng rate level and on level cyclc structure to construct level routng table Process of node leaves system Assumed node dentfer p, and the level of successful accessng rate d p =m. Step1: Conduct leavng operaton accordng to level routng table n the cyclc structure whose successful accessng rate level s m. Update level routng tables of other related nodes correspondngly. Step2: Complete leavng operaton accordng to system routng table n the system and update system routng tables of related nodes correspondngly Process of node level transton Assume p s the current node and successful accessng level d p =m. The level to be transted s d = n. ' p Step1: Conduct leavng operaton accordng to level routng table n the cyclc structure whose successful accessng rate level s m. Update level routng tables of other related nodes correspondngly. Step2: Modfy successful accessng rate level of node p to n. Step3: Update system routng tables of related nodes correspondngly. In the Fg. 1, assume node successful accessng rate level of node 7 transts from level 4 to level 5, then routng table update of node 0 updates as Table 2 shows. Step4: The node p fnds nodes whose successful accessng rate level s n accordng to own system routng table. Jon ths level cyclc structure and buld level routng table. 3.3 Routng Algorthm The basc dea of SARB routng algorthm s as followng. Source node send query message wth ntal TTL value to network. Frstly send message to node wth hghest successful accessng rate level accordng to system routng table. Then search n the same level based on level routng table, and 277
4 return query result to source node after found correspondng target. nt. [1, 2) [2, 4) [4, 0) Table 2: Routng table of node 0 after node 7 transt level System routng table (fnger table) succ Level routng table (fnger table) d=1 [1, 0) 1 d d 1 =1 d 2 =3 d 6 =5 As the node system routng table stores nodes wth hghest successful accessng rate level n the whole system area, the system routng table of node sendng request can fnd the node wth hghest Algorthm 1 successful accessng rate level n the system. Therefore, t only needs one step from source node to node cluster wth hghest successful accessng rate level. The algorthm s shown n Fg. 2. Assume P s current node. Input s query message Q=query(message, Src, TTL). Where, message s query semantc descrpton; Src s query message ntate node; TTL s maxmum lfetme of ths query message. The output s target result R to Src. f (P==Src) Look for node wth maxmum level successful accessng rate n local system routng table and forward query message; else Set Q.TTL=Q.TTL-1; Execute local query, return query result to Src; f (Q.TTL>0) Send query to other nodes n same successful sccessng rate elvel wth P accordng to level routng table; end f end f From the algorthm 1 we can see that the nodes wth hghest successful accessng rate level are accessed n each tme of query, whch wll ncrease overhead of these nodes. However, the nodes wth lower level only have fewer tmes been accessed, whch also not conductve for ncrease of node level. Therefore, the paper brought out SARB routng algorthm 2. In the query process of algorthm 2, source node adds successful accessng rate level of t n the query packet. The query was carred out on same success rate level wth source node except for hghest level. The contrbuton level of routng s equal to or lower than node request from query Fgure 2: Specfc steps of algorthm 1 node. On the contrary, t can refuse the request wth certan probablty. The algorthm 2 s shown n Fg. 3. The node accepts resource request from node wth probablty pd ( ) and the probablty 1 pd ( ) to refuse the request. The computaton of probablty pd ( ) s as followng: 1 d d pd ( ) 1 = d < d λ d (1) 278
5 Assume P s current node and d p s successful accessng rate level of node P. Input s query message Q=query(message, Src, TTL, d src ). Where, message s query senmatc descrpton; Src s query message ntate node; TTL s maxmum lfetme of query message; d src s successful accessng rate level of source node. Output target result s R to Src. f (P==Src) Forward query message accordng to local level routng table; Look for node wth maxmum level successful accessng rate n local system routng table and forward query message; else set Q.TTL=Q.TTL-1; Execute local query wth probablty p(d p -d src ) and return query result to Src; f (Q.TTL>0) Send query to other nodes n same successful sccessng rate elvel wth P accordng to level routng table; end f end f Where, λ s constant coeffcent factor and ts value s n the nterval of (1, 2]. Therefore, f the successful accessng rate level d of node s small, the node wth hgher level than node lkely refuse request from node. We can see that the above two algorthms use abler way. In the algorthm 2, hgher level node can refuse response to query request for decreasng overhead. Meanwhle, t also needs to constantly mprove own level by respondng to query requests. The node wth lower level can only access to opportunty to response request of nodes n same level by sendng request, so as to ncrease successful accessng rate level. Therefore, algorthm 2 s a knd of routng algorthm wth reward mechansm. In addton, the above two knds of routng algorthms may not fnd necessary resources, whch s determned by query on resources by resource node accordng to unstructured P2P network floodng or random walk way. 3.4 Supervse Mechansm Nodes n the SARB routng algorthm automatcally compute ts own successful accessng rate and perform level transton accordng to value of success rate. When the node n algorthm 2 receves query request, t determnes whether to answer ths request from dfference between successful accessng rates from send and receve node. It may have forge behavor for node ntated query to obtan hgher response rate. In vew of ths stuaton, the successful accessng rate Algorthm 2 Fgure 3: Specfc steps of algorthm neghborhood montorng mechansm (NMM) was proposed. The man dea of NMM s to constran node behavor relayng on montorng mechansm from neghbors. The specfc descrpton s as followng. Each node keeps all neghbor statuses. The neghbor status s determned by answer stuaton of neghbor on query request, whch can be dvded nto two knds of met or un-met. The node dynamcally mantans neghbor based on recorded neghbor status. If a neghbor s n met status, normally routes t. Otherwse, unlnk connecton to ths neghbor. If all adacent nodes unlnk connectons wth ths node, t s n solated status n system. So t cannot perform queryng or routng, so as to avod forgery behavors. The method does not need large amount of nformaton nteracton among nodes n EgenTrust algorthm. Furthermore, dynamc changng feature of node successful accessng rate level enable neghbor nodes not easly form colluson. It s smple for mplementaton and has good scalablty [11-13]. 4. PERFORMANCE ANALYSIS 4.1 Evaluaton Indexes The paper uses followng two ndexes to evaluate ts semantc query performance, namely recall T(Q) and average message number generated n queryng. Recall s the proporton of searched documents number met condtons n all related documents, the formula of whch s as follows:
6 Dgetcorrect TQ ( ) = (2) D Where, D total s set of all related documents dstrbuted on P2P network amng at some query; D getcorrect s the actually obtaned document set. The quered average message number M means average generated message number n the propagaton process on P2P network. Its sze determnes network overhead change caused by query operaton, whch s mportant ndex to measure network structure. 4.2 Algorthm Analyss Assume there are N nodes n the system that marked as P1, P2,, PN. The node successful accessng rate level can be dvded nto K levels (0,1,, K 1) accordng to value. The successful accessng rate level of node P d =m. The node number n ths level s num(m). The hghest level of node successful accessng rate level n current system s n. Node number n ths level s num(n). When the node P ntate query Q, the average message number generated by queres by algorthm 1 s M = 1 + log(num( n)). In the algorthm 2, the average message number generated by queres s M = 1 + log(num( n)) + log(num( m)). We can see that the average query message number s larger than that of algorthm 1. total Clearly, the routng algorthm under SARB structure s sgnfcantly lower than floodng mechansm n Gnutella n the aspect of query average message number. 4.3 Performance Smulaton In the smulaton experment, GT-ITM topology generator was used to generate random network topology. The transt-stub (TS) model that s more representatve of Internet structure was also used. Network node sze s Dstrbute documents for each node accordng to Zpf dstrbuton wth parameter α =1.2. The requred resources n query also ntates accordng to Zpf dstrbuton wth parameter α =1.2. Assume each node has at most 100 documents n the test. All the results are average value under tmes of queres. The comparson of recall between two algorthms and Gnutella wth dfferent TTL s shown n Fg. 4. From the fgure we can see that the recall of algorthm s bgger than that of algorthm 1 n lower TTL value as t use the strategy that synchronous query of own level wth hghest level. However, wth ncrease of TTL value, as algorthm 2 has stuaton that hgh level refuse to access lower level servce, the recall s lower than that of algorthm 1. Under crcumstance of TTL<6, the routng algorthm based on SARB structure proposed n the paper s sgnfcantly hgher than Gnutella, whch shows ts superorty. 5. CONCLUSION Fgure 4: Comparson of recall n algorthms under dfferent TTL condtons In order to mprove routng performance of unstructured P2P network, the method to construct overlay topology based on nterest group s manly used now. The method can only be accomplshed 280 by cooperaton among users, whch ncreases system communcaton amount and occupes large bandwdth. The peer-to-peer network routng model SARB based on successful accessng rate ust organze nodes wth smlar successful accessng rate together. It s frstly conducted n nodes wth larger successful accessng rate so that the resource
7 recall can be ncreased. The paper also gves basc structure of SARB as well as node status mantenance and two knds of routng algorthm. Smulaton experments show that ths structure can sgnfcantly mprove recall under smaller TTL compared wth Gnutella. REFRENCES: [1] Morrs R., Lben-Nowell D., Karger D. R., Kaashoek M. F., Dabek F., Balakrshnan H., Chord: a scalable peer-to-peer lookup protocol for Internet applcatons, IEEE/ACM Transactons on Networkng, Vol. 11, No. 1, 2003, pp [2] Sylva Ratnasamy, Paul Francs, Mark Handley, Rchard Karp, Scott Shenker, A scalable content addressable network, In Proceedngs of ACM SIGCOMM, 2001, pp [3] Chrstos Gkantsds, Mlena Mhal, Amn Saber, Random walks n peer-to-peer networks, In Proceedngs of IEEE INFOCOM, 2004, pp [4] Arturo Crespo, Hector Garca, Random walks n peer-to-peer networks, In Proceedngs of the Thrd nternatonal conference on Agents and Peer-to-Peer Computng, 2004, pp [5] Sepandar D. Kamvar, Maro T. Schlosser, Hector Garca-Molna, The egentrust algorthm for reputaton management n P2P networks, In Proceedngs of the 12th nternatonal conference on World Wde Web, 2003, pp [6] Wang Yan-lang, Research on Small World Model n P2P Networks, Advances n Informaton Scences and Servce Scences, Vol. 4, No. 2, 2012, pp [7] Sh-dong Zhang, Geng-yu We, Ba Wang, Deyu Yuan, An Optmzaton Method for P2P Resource Schedulng, Internatonal Journal of Dgtal Content Technology and ts Applcatons, Vol. 6, No. 4, 2012, pp [8] Chuan Xu, Hong Tang, CongCong Xng, P2P Traffc Localzaton Based on Peer-Lst Cachng, Internatonal Journal of Advancements n Computng Technology, Vol. 4, No. 5, 2012, pp [9] Zhenlng Wang, A Novel Peer to Peer Traffc Identfcaton Approach based on Hybrd Feature Selecton Algorthm, Internatonal Journal of Dgtal Content Technology and ts Applcatons, Vol. 6, No. 8, 2012, pp [10] Hung-Wen Yang, Chou-Chen Yang, Y-Ju Ln, Woe Ln, A Novel Authorzed Fle-Sharng Protocol for P2P Networks, Advances n Informaton Scences and Servce Scences, Vol. 4, No. 8, 2012, pp [11] Zhgang Chen, Lmao L, Jngsong Gu, Fuzzy Theory for the P2P Subect Trust Evaluaton Model, Internatonal Journal of Advancements n Computng Technology, Vol. 4, No. 8, 2012, pp [12] Jaq Lu, Zhgang Chen, Deng L, Zhong Ren, RELO: a Robust, Effcent and Low-cost Peerto-Peer Overlay for Autonomc Communcaton, Internatonal Journal of Advancements n Computng Technology, Vol. 4, No. 6, 2012, pp [13] Ju-Yn Chuang, Pe-Lng Hsu, Y-Shn Chen, Improvng Broadcast Processes n Peer-to-Peer Systems, Advances n Informaton Scences and Servce Scences, Vol. 4, No. 8, 2012, pp
Load Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationA Topology-aware Random Walk
A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble
More informationResearch of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm
, pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationFederated Search of Text-Based Digital Libraries in Hierarchical Peer-to-Peer Networks
Federated Search of Text-Based Dgtal Lbrares n Herarchcal Peer-to-Peer Networks Je Lu School of Computer Scence Carnege Mellon Unversty Pttsburgh, PA 15213 jelu@cs.cmu.edu Jame Callan School of Computer
More informationReal-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems
Real-tme Fault-tolerant Schedulng Algorthm for Dstrbuted Computng Systems Yun Lng, Y Ouyang College of Computer Scence and Informaton Engneerng Zheang Gongshang Unversty Postal code: 310018 P.R.CHINA {ylng,
More informationSelective Flooding Based on Relevant Nearest-Neighbor using Query Feedback and Similarity across Unstructured Peer-to-Peer Networks
Journal of Computer Scence 5 (3):184-190, 009 ISSN 1549-3636 009 Scence Publcatons Selectve Floodng Based on Relevant Nearest-Neghbor usng Query Feedback and Smlarty across Unstructured Peer-to-Peer Networks
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationParallel matrix-vector multiplication
Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationAnalysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD
Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,
More informationScheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research
More informationAvailable online at Available online at Advanced in Control Engineering and Information Science
Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced
More informationA Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI
216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent
More informationEfficient Content Distribution in Wireless P2P Networks
Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,
More informationPerformance Evaluation of Information Retrieval Systems
Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence
More informationSteps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices
Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between
More informationAN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS
AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS Lngku Meng a, Wenun Xe a, *, Dan Lu a, b a School of Remote Sensng and Informaton Engneerng, Wuhan Unversty, Wuhan 4379,
More informationAn Improved Image Segmentation Algorithm Based on the Otsu Method
3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,
More informationA Low Energy Algorithm of Wireless Sensor Networks Based on Fractal Dimension
Sensors & Transducers 2014 by IFSA Publshng, S. L. http://www.sensorsportal.com A Low Energy Algorthm of Wreless Sensor Networks ased on Fractal Dmenson Tng Dong, Chunxao Fan, Zhgang Wen School of Electronc
More informationA Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes
A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented
More informationBIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING
An Improved K-means Algorthm based on Cloud Platform for Data Mnng Bn Xa *, Yan Lu 2. School of nformaton and management scence, Henan Agrcultural Unversty, Zhengzhou, Henan 450002, P.R. Chna 2. College
More informationGateway Algorithm for Fair Bandwidth Sharing
Algorm for Far Bandwd Sharng We Y, Rupnder Makkar, Ioanns Lambadars Department of System and Computer Engneerng Carleton Unversty 5 Colonel By Dr., Ottawa, ON KS 5B6, Canada {wy, rup, oanns}@sce.carleton.ca
More informationProfessional competences training path for an e-commerce major, based on the ISM method
World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationResource and Virtual Function Status Monitoring in Network Function Virtualization Environment
Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationAADL : about scheduling analysis
AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationQuery Clustering Using a Hybrid Query Similarity Measure
Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationEvaluation of an Enhanced Scheme for High-level Nested Network Mobility
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.
More informationFuture Generation Computer Systems
Future Generaton Computer Systems 29 (2013) 1631 1644 Contents lsts avalable at ScVerse ScenceDrect Future Generaton Computer Systems journal homepage: www.elsever.com/locate/fgcs Gosspng for resource
More informationDelay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks
Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationResearch Article Information Transmission Probability and Cache Management Method in Opportunistic Networks
Wreless Communcatons and Moble Computng Volume 2018, Artcle ID 1571974, 9 pages https://do.org/10.1155/2018/1571974 Research Artcle Informaton Transmsson Probablty and Cache Management Method n Opportunstc
More informationOverview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION
Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup
More informationMining User Similarity Using Spatial-temporal Intersection
www.ijcsi.org 215 Mnng User Smlarty Usng Spatal-temporal Intersecton Ymn Wang 1, Rumn Hu 1, Wenhua Huang 1 and Jun Chen 1 1 Natonal Engneerng Research Center for Multmeda Software, School of Computer,
More informationRAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:
Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:
More informationA Fair MAC Algorithm with Dynamic Priority for e WLANs
29 Internatonal Conference on Communcaton Software and Networks A Far MAC Algorthm wth Dynamc Prorty for 82.e WLANs Rong He, Xumng Fang Provncal Key Lab of Informaton Codng & Transmsson, Southwest Jaotong
More informationQuality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation
Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on
More informationFast Computation of Shortest Path for Visiting Segments in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang
More informationMusic Information Retrieval Schemes in Peer-to-Peer Environments
Journal of Computer Scence 1 (3): 369-375, 2005 ISSN 1549-3636 Scence Publcatons, 2005 Musc Informaton Retreval Schemes n Peer-to-Peer Envronments Chaokun Wang, Janzhong L and Shengfe Sh School of Computer
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationBRDPHHC: A Balance RDF Data Partitioning Algorithm based on Hybrid Hierarchical Clustering
015 IEEE 17th Internatonal Conference on Hgh Performance Computng and Communcatons (HPCC), 015 IEEE 7th Internatonal Symposum on Cyberspace Safety and Securty (CSS), and 015 IEEE 1th Internatonal Conf
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationApplication of VCG in Replica Placement Strategy of Cloud Storage
Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng
More informationPopularity and gain based caching scheme for information-centric networks
Research Artcle Internatonal Journal of Advanced Computer Research, Vol 7(30) ISSN (Prnt): 2249-7277 ISSN (Onlne): 2277-7970 http://dx.do.org/10.19101/ijacr.2017.730015 Popularty and gan based cachng scheme
More informationA New Approach For the Ranking of Fuzzy Sets With Different Heights
New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationOutline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like:
Self-Organzng Maps (SOM) Turgay İBRİKÇİ, PhD. Outlne Introducton Structures of SOM SOM Archtecture Neghborhoods SOM Algorthm Examples Summary 1 2 Unsupervsed Hebban Learnng US Hebban Learnng, Cntd 3 A
More informationAdaptive Energy and Location Aware Routing in Wireless Sensor Network
Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}
More informationELEC 377 Operating Systems. Week 6 Class 3
ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems
More informationEfficient Broadcast Disks Program Construction in Asymmetric Communication Environments
Effcent Broadcast Dsks Program Constructon n Asymmetrc Communcaton Envronments Eleftheros Takas, Stefanos Ougaroglou, Petros copoltds Department of Informatcs, Arstotle Unversty of Thessalonk Box 888,
More informationQuantifying Responsiveness of TCP Aggregates by Using Direct Sequence Spread Spectrum CDMA and Its Application in Congestion Control
Quantfyng Responsveness of TCP Aggregates by Usng Drect Sequence Spread Spectrum CDMA and Its Applcaton n Congeston Control Mehd Kalantar Department of Electrcal and Computer Engneerng Unversty of Maryland,
More informationSorting. Sorted Original. index. index
1 Unt 16 Sortng 2 Sortng Sortng requres us to move data around wthn an array Allows users to see and organze data more effcently Behnd the scenes t allows more effectve searchng of data There are MANY
More informationA fair buffer allocation scheme
A far buffer allocaton scheme Juha Henanen and Kalev Klkk Telecom Fnland P.O. Box 228, SF-330 Tampere, Fnland E-mal: juha.henanen@tele.f Abstract An approprate servce for data traffc n ATM networks requres
More informationInternational Journal of Applied Mathematics and Soft Computing
Internatonal Journal of Appled Mathematcs and Soft Computng -------------------------------------------------------------------------------- Presdent: Zhang Jnrong Chef Planner: Hu Yuejuan Executve Chef
More informationTTEM: An Effective Trust-Based Topology Evolution Mechanism for P2P Networks
JOURNAL OF COMMUNICAIONS, VOL. 3, NO. 7, DECEMBER 2008 3 EM: An Effectve rust-based opology Evoluton Mechansm for P2P Networks Janl Hu Insttute of Networks & Informaton Securty, School of Computer, Natonal
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationPriority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks
Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,
More informationA New Transaction Processing Model Based on Optimistic Concurrency Control
A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,
More informationWireless Sensor Network Localization Research
Sensors & Transducers 014 by IFSA Publshng, S L http://wwwsensorsportalcom Wreless Sensor Network Localzaton Research Lang Xn School of Informaton Scence and Engneerng, Hunan Internatonal Economcs Unversty,
More informationIP Camera Configuration Software Instruction Manual
IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the
More informationCapability-Aware Object Management based on Skip List in Large-Scale Heterogeneous P2P Networks
Takash Tommoto, Takuj Tachbana, Kenj Sugmoto Capablty-ware Object Management based on Skp Lst n Large-Scale Heterogeneous PP Networks TKSHI TOMIMOTO, TKUJI TCHIBN, KENJI SUGIMOTO Graduate School of Informaton
More informationEnergy efficient prediction clustering algorithm for multilevel heterogeneous wireless sensor networks
Abstract: nergy effcent predcton clusterng algorthm for multlevel heterogeneous wreless sensor networks Tang Lu a,b,c,* Jan Peng b,c Jn Yang d Chunl Wang e a College of Fundamental ducaton, Schuan Normal
More informationA Novel Distributed Collaborative Filtering Algorithm and Its Implementation on P2P Overlay Network*
A Novel Dstrbuted Collaboratve Flterng Algorthm and Its Implementaton on P2P Overlay Network* Peng Han, Bo Xe, Fan Yang, Jajun Wang, and Rumn Shen Department of Computer Scence and Engneerng, Shangha Jao
More informationA Distributed Dynamic Bandwidth Allocation Algorithm in EPON
www.ccsenet.org/mas Modern Appled Scence Vol. 4, o. 7; July 2010 A Dstrbuted Dynamc Bandwdth Allocaton Algorthm n EPO Feng Cao, Demng Lu, Mnmng Zhang, Kang Yang & Ynbo Qan School of Optoelectronc Scence
More informationA CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION
A CALCULATION METHOD OF DEEP WEB ENTITIES RECOGNITION 1 FENG YONG, DANG XIAO-WAN, 3 XU HONG-YAN School of Informaton, Laonng Unversty, Shenyang Laonng E-mal: 1 fyxuhy@163.com, dangxaowan@163.com, 3 xuhongyan_lndx@163.com
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationApplication of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling
, pp.40-45 http://dx.do.org/10.14257/astl.2017.143.08 Applcaton of Improved Fsh Swarm Algorthm n Cloud Computng Resource Schedulng Yu Lu, Fangtao Lu School of Informaton Engneerng, Chongqng Vocatonal Insttute
More informationInternet Traffic Managers
Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John
More informationFAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks
2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng
More informationRoutability Driven Modification Method of Monotonic Via Assignment for 2-layer Ball Grid Array Packages
Routablty Drven Modfcaton Method of Monotonc Va Assgnment for 2-layer Ball Grd Array Pacages Yoch Tomoa Atsush Taahash Department of Communcatons and Integrated Systems, Toyo Insttute of Technology 2 12
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationWITH rapid improvements of wireless technologies,
JOURNAL OF SYSTEMS ARCHITECTURE, SPECIAL ISSUE: HIGHLY-RELIABLE CPS, VOL. 00, NO. 0, MONTH 013 1 Adaptve GTS Allocaton n IEEE 80.15.4 for Real-Tme Wreless Sensor Networks Feng Xa, Ruonan Hao, Je L, Naxue
More informationJournal of Chemical and Pharmaceutical Research, 2014, 6(10): Research Article. Study on the original page oriented load balancing strategy
Avalable onlne www.jocpr.com Journal of hemcal and Pharmaceutcal Research, 2014, 6(10):274-280 Research Artcle IN : 0975-7384 ODEN(UA) : JPR5 tudy on the orgnal page orented load balancng strategy Kunpeng
More informationTECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.
TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of
More informationBehavioral Model Extraction of Search Engines Used in an Intelligent Meta Search Engine
Behavoral Model Extracton of Search Engnes Used n an Intellgent Meta Search Engne AVEH AVOUSI Computer Department, Azad Unversty, Garmsar Branch BEHZAD MOSHIRI Electrcal and Computer department, Faculty
More informationEffectiveness of Information Retraction
Effectveness of Informaton on Cndy Hu, Malk Magdon-Ismal, Mark Goldberg and Wllam A. Wallace Department of Industral and Systems Engneerng Rensselaer Polytechnc Insttute Troy, New York Emal: huc@rp.edu,
More informationResearch and Application of Fingerprint Recognition Based on MATLAB
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department
More informationDistributed Middlebox Placement Based on Potential Game
Int. J. Communcatons, Network and System Scences, 2017, 10, 264-273 http://www.scrp.org/ournal/cns ISSN Onlne: 1913-3723 ISSN Prnt: 1913-3715 Dstrbuted Mddlebox Placement Based on Potental Game Yongwen
More informationA Frame Packing Mechanism Using PDO Communication Service within CANopen
28 A Frame Packng Mechansm Usng PDO Communcaton Servce wthn CANopen Mnkoo Kang and Kejn Park Dvson of Industral & Informaton Systems Engneerng, Ajou Unversty, Suwon, Gyeongg-do, South Korea Summary The
More informationResource Discovery in P2P Networks Using Evolutionary Neural Networks
> PAPER IDENTIFICATION NUMBER: 067-04 < Resource Dscovery n P2P Networks Usng Evolutonary Neural Networks Mkko A. VAPA, Nko P. KOTILAINEN, Annemar K. AUVINEN, Hekk M. KAINULAINEN, and Jarkko T. VUORI Abstract--
More informationSecurity Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments
Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub
More informationDynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication
Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons
More informationAnalysis of Collaborative Distributed Admission Control in x Networks
1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,
More informationA Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks
A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,
More information