Different criteria of dynamic routing

Size: px
Start display at page:

Download "Different criteria of dynamic routing"

Transcription

1 Procedia Coputer Science Volue 66, 2015, Pages YSC th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich Institute for Inforation Transission Probles of ussian Acadey of Sciences kurochkin@iitp.ru, greenjak@iitp.ru Abstract The atheatical odel of functioning of a telecounication network is developed. The analysis technique of the telecounication networks, loading of networks revealing direct dependence on routing strategy is ipleented. The priary goals which can be solved: check of efficiency of strategy of routing; deterination of vulnerabilities in a telecounication network; execution of estiation and the coparative analysis of various strategies of routing. esults of experients on coparison of efficiency of heuristic algoriths of the routing directed on the axiu increase in the general traffic on networks are presented. Coparing of results of atheatical siulation by several criteria was allowed to range heuristic algoriths on a level of fitness to dynaic filling of telecounication networks. Keywords: Dynaic routing, telecounication network, rational use of network resources, ulticoodity proble, inial cost path algorith 1 Introduction In the paper we present our results of studies of the proble which is very iportant in telecounication industry. We consider telecounication network consisting of coutation nodes and counication links of liited capacities. Then, suppose that a nuber of network subscribers pairs generate a sequence of essages (requests) which have to be sent fro one subscriber to another. How should these essages be routed to axiize the nuber of fulfilled requests? Prior to atheatical foralization we will present brief survey of ethods of siilar probles' solving. We think that well-known in the network flow theory so called ulticoodity proble (Fulkerson & Ford, 1962), (Hu, 1970). It is stated as the adissibility proble for coodity specified intensity flows organization in a network with specified capacitated links. It is true that in such traditional stateent the requireents for intensity of coodity flows aong subscribers are * asterinded EasyChair and created the first stable version of this docuent Created the first draft of this docuent 166 Selection and peer-review under responsibility of the Scientific Prograe Coittee of YSC 2015 c The Authors. Published by Elsevier B.V. doi: /j.procs

2 Different criteria of dynaic routing... specified at once, iediately. Our proble will be reduced to a traditional stateent, if all requests aong subscribers are suarized at a certain oent and the flow distribution proble is solved in line with the adissibility proble. It should be noted that there are no special effective ethods of ulticoodity proble solving, in respect of coputation it is a linear prograing proble. The queuing network ethod is the ain ethod of telecounication network analysis. any works are devoted to this ethod (Ivnitsky, 2004) (artynov, Vatutin, & Titiov, 2014). Nevertheless we don t know works within the fraework of this ethod devoted to search of routing algoriths axiizing or at least increasing network total capacity as copared to any known algorith. The prevailing routing algorith in Internet is the iniu path-length algorith (used for exaple in the network layer IP-protocol) or the iniu cost path algorith where costs are assigned to counication lines in accordance with various criteria delay factor, transission bandwidth, reliability etc. The nuerical values of criteria in the OSPF network layer protocol are called etrics. Qualitative ethod presented in this work includes the following. At each certain oent a telecounication network is characterized by links residual capacities. Next inforation channel should be developed so that as uch as possible of resource could be left in the network (Grinberg, Kurochkin, & Korkh, TPSA, 2012). By resource we shall eat two criteria link residual capacity and inial-cut inial capacity of all subscriber pairs. Accordingly two groups of algoriths will be offered. 2 Proble stateent and brief description As a atheatical odel of telecounication network we take a connected un-oriented graph, where vertices represents network coutation nodes and edges (Grinberg & Kurochkin, The study of the results of atheatical odeling of networks with sequential filling of the cluster topology, 2009) (Grinberg & Kurochkin, atheatical odeling of dynaic networks of sequential filling of streas due, 2009). Initially, i.e. the epty network is characterized by edge capacities. Network subscribers are represented by a subset of vertices (further we'll call the poles). Those network nodes that are not included in the poles set are coutation ones. On the subscribers request a path (counication channel) is developed between a pole pair passing along the graph edges and a coodity unit-intensity flow is allowed along this path. Hereupon capacities of the edges, along which the path passes, are reduced by a unit. Then another pair of poles is selected and the procedure is repeated. The proble is: how to select paths between pole pairs to fulfill axiu nuber of requests. In other words which should be the path-tracing algorith - routing algorith to fulfill axiu possible nuber of requests for all types of networks and all variants of requests aong poles. Let us call algoriths, realizing path selection in sequence as per each request, sequential algoriths. It is supposed that it is ipossible to change the selected path. Let us call ulticoodity proble solving algoriths, when edge flows and paths identification is ade in accordance with pole interchange intensity specified suarized requireents, synchronous algoriths. One of sequential algoriths is the iniu path-length algorith (as per edge nuber). Let us call this algorith a siple algorith. One of synchronous algoriths is the linear prograing algorith or LPalgorith. The LP- algorith is absolute one in the sense that in the network load of requireents can be coplied with when and only when adissibility proble is solved. Let us call the sequential algorith optial one, if ipossibility to fill the next request per this algorith eans adissibility proble insolubility for the entire load of requireents. We think that it is hardly possible to develop an optial sequential algorith due to the fact that at each certain oent there is uncertainty of requireent final distribution aong pole pairs. The 167

3 Different criteria of dynaic routing... objective of the present work is to offer sequential algoriths increasing network suarized traffic as copared to a siple algorith. Two groups of algoriths will be offered. One of these is based on the concept that the next path to be developed along the edges with this oent axiu residual capacities. Another group is based on coputation of capacities of inial cuts aong all pole pairs on the basis of data about network edge residual capacities as well as on acceptance of probability law for requireent distribution aong pole pairs. 3 Sequential filling algoriths Let G be a network consisting of N vertices A 1, A 2,,A N, where A i, i=1,2, N 1, N 1 N are poles, and K edges B 1,,B K, with b k, k=1,2,,k, capacities. Let us arrange soehow all pole pairs. The total nuber of various pole pairs in the G network is equal to = N 1 (N 1-1)/2. Let us assue that coodity flow aong pole pairs organization requireents follow the probability law, i.e. there are nonegative nubers p, = 1,2,,, such that p 1. These nubers are probabilities of request for coodity flow between the -th pole pair in coon requests flow. We suppose also that request copletion eans organization of unit intensity flow. 3.1 Fundaental inial-cut algorith Let us introduce the following designations. capacity of the inial cut between the -th pole pair equal, in accordance with the axial flow and inial cut, to the axial flow between this pole pair; inial cut capacity average aong all pole pairs. Let us generate the following value, which will be later called criterion or irregularity easure : 1 2 ( p), 1 1 (1) This value is the isatch easure between inial cuts (noralized in a certain anner) and probabilities of this pole pair requests. The ore isatch is the bigger value is. eanwhile it is clear that one should expect that the better atched inial cuts and probabilities are, the ore requests can be filled. Thus the next path is to be selected so that this value should be inial in the network with edge capacity residual values. This is equivalent to this value increent upon the next path selection should be inial (in the algebraic sense). In the special case of request equiprobable distribution as per pole pairs, i.e. with p = 1/, (1) it is siplified and takes on the following for: 2 ( 1). (2) 1 (The 1/ 2 constant factor is not essential and is not taken into consideration.) The next request fill is identification of the path between the pole pair and allowing the unit intensity flow along it. Herewith the G network is changed as b k. arc capacities are changed. This change is to result in the χ value inial increent. Let us express the χ value and its increent in ters of b k. value. For this purpose we will need to know all inial cuts aong all pole pairs in the G network. 168

4 Different criteria of dynaic routing... Let us assue that b, s 1,2,..., S, the s-th edge of the l-the inial cut between the -th l s pole pair, S l this cut edge nuber. Then l L Sl 1 b, (3) L l 1 s 1 where L total nuber of inial cuts between the -th pole pairs. Let us convert this forula by defining u, 1,, k 1, K nubers as such, which designate the nuber of various k inial cuts between the -th pole pair, which include the B k. arc. Then it is evident that k k L k 1 l s K 1 u b. (4) With account of (4) the network irregularity (1), (2) appears to be expressed in ters of the b k. values. Upon the next eleentary requireent is filled the G network is changed as related to the b k, value change, therefore the value will also be changed. In the case if the b k value relative change is inor, the network irregularity change is deterined by the next forula: Later we have: where u ( ) b, K K b k k k1bk k1 bk 1 b (5) k , 1 (6) 1 uk rk, (7) b L k 2 1 ( p), k rk, rk rk. L 1 K bk rk rkp r 2 k rk k1 1 1 (9) Equation (9) iplies that network irregularity easure increent is given as the linear for as per arc capacity increents. The proble is to ake this increent inial (in the algebraic sense, i.e. increent negative values are possible) while filling the next eleentary requireent. Thus we coe to the proble of inial cost path search. If the eleentary requireent flow is equiprobable for all pole pairs, then (9) is siplified and becoes:, (8) 169

5 Different criteria of dynaic routing... K bk r 2 k rk k1 1. (10) Let us write out explicitly the forula with account that for any path all bk increents are negative (or equal to zero): 2 1 Wk rk rkp r, 2 k rk 1 (11) 1 in the general case and 2 1 Wk r. 2 k rk (12) 1 for requests equiprobable distribution. The forulas (11), (12) include values, fully deterined by network edge capacities, which are changed upon each next eleentary requireent fill. Thus in general ters edge cost total recalculation is needed at each step for deterination of the optial path according to this criterion. [4][5] 3.2 Fundaental edge algorith We want to recall that this algorith idea is that each next path should be allowed along axiu capacity network edges. The proble of this section is to foralize this idea so that this path search appeared to be inial cost path search. Let us introduce the following definitions. Let us distribute all network edges by classes, in each of which let us place the sae capacity edges, and let us arrange all classes in the order of included edge capacity increase. Let us assue that B 1,, B q,, B Q are designations of introduced classes (the fact the edge class designation coincides with the G network edges theselves designation as a atter of fact there s no risk of abiguity), K 1,, K Q are edge nuber in these classes, b 1,, b Q are the capacities value of the edge included in these classes. Now let C be the path fro one pole to another and this path includes c 1 edges of the B 1, class, c q N c Q edges of the B Q class. By definition all c q, c q 0, are integers, oreover, 1, as any q1 path cannot include ore than с edges. Let us treat each path as a Q-bit nuber, i.e. c 1, c 2,, c Q, where each digit is an integer less or equal to N-1. It enables us to arrange eleents of path set in nuerical order. Each path corresponds to unique nuber, but the sae nuber can represent different paths. Now it is possible to state path optiality criterion with the next request fill the inial path is the optial path, i.e. the path deterining the inial nuber The proble is that it is necessary to assign such costs to the edges that the nuber-path having a unit in a bit and zero in previous ones, should be ore than any other path-nuber having zero in all these bits. One of the possible ethods of such costs deterination is the following one: Qq Wq ( N 1), q 1,... Q The path cost in this case is just a nuber, which it deterines, understood to be a N-1-based positional nuber. Q (13) 170

6 Different criteria of dynaic routing Other inial-cut algoriths Preliinary calculations in accordance with the (12) forulas showed that edge costs can be both positive and negative, herewith negative cycles are not rare ones. In these conditions inial cost path selection is the NP-full proble which is inacceptable for nuerical experients. Therefore we introduce fundaental inial-cut algorith odification, which is as follows. Aong all edges having in accordance with (12) forulas negative values we will select the axiu per odulus value and will designate it with W 0. Let us introduce new costs in accordance with the forula W W W0, 0 k k (14) Such transforation akes all costs positive and deletes the probles of inial cost paths search, but it is of course arbitrary. Such transforation effectiveness can be justified or invalidated only by nuerical experients. Let us call the algorith based on such transforation the additive incut algorith. Another algorith is based solely on the siple concept that if a G network edge enters the inial cuts, then its cost should be as higher as less is the inial capacity of all inial cuts, where this edge enters. Soe preliinary researches resulted in the following ethod of edge cost deterination: 4 W N 1 ( h 1), (15) where h is the serial nuber of the, inial cut value, which are ordered in accordance with capacity increase and is the total nuber of various per capacity inial cuts. Let us call this algorith epirical incut algorith. 3.4 Other edge algorith The fundaental edge algorith is the contrasting algorith, in which the next path is allowed along less capacity edges only in the case, if it is ipossible to allow it along ore capacity edges. This algorith can be softened by introducing, like in epirical inial-cut algorith, continuous function of weight assigning. I.e. let us assue that edge costs are deterined by the forulas 4 W N 1 ( T a 1), (16) where a is the serial nuber of the class of the edges, which are arranged in accordance with capacity increase and T is the nuber of edge classes. This function was selected in accordance with the principle: the less is the arc capacity, ore expensive it is. This algorith was called the epirical edge algorith. 4 esults and discussion We developed a coputer odel of all ain stages of telecounication network functioning generation of nonoriented graph with specified nuber of vertices, poles, edges and capacities thereof, generation of request flow, coputation of the network irregularity criteria, edge cost calculation for each algorith there is its own calculation ethod deterination of inial cost path, unit intensity flow passing and corresponding change of the network edge capacities. The nuerical experient in general for one network is the nuerical realization of this network filling process independently for each algorith. The general factor for these experients is, first, the initial ( epty ) network and, second, the requests sequence. In all presented in this work experients the request sequence was equiprobable for all pole pairs. The experient to be done in two odes static and dynaic. In the static ode the path developed between the pole pair and the unit flow along it are kept until the experient copletion. 171

7 Different criteria of dynaic routing... Thus such network resource like all its edges capacity onotonically decreases. In the dynaic ode the counication channel lifetie is finite and follows the probability law we accepted the Gaussian offset law. In this ode the network filling process can include (or even copletely consist of) stationary areas with failure various levels. In the stationary ode filled requests nuber to first failure is registered as well as total nuber of filled requests and total nuber of failures, and the experient is copleted either when failure intensity is over a certain critical level or upon tie expiry, i.e. of total nuber of the network requireents. Networks with topology connected clusters are considered and stochastic topology of the Network consist of nodes, have the initial capacity of arches fro 30 to 500 and have 7-45 couples poles (couples a source drain). Filling is ade by single flows. atheatical odeling of process of filling of a network happens before the following criteria: criterion of the first refusal (carrying out the next deand is ipossible, one of couples a source drain is incoherent; iniu fro a set of the iniu cuts between couples of poles it is equal 0); criterion of full refusal (drains aren't achievable fro sources, for all couples of poles; all iniu cuts between couples of poles are equal 0); an exit to the stationary ode when the criterion of full refusal isn't achievable, but rather large nuber of deands is already processed Dynaic filling of a telecounication network assues that deands through certain tie release network resources, that is have soe tie of life after which the capacities of arches belonging to the carried-out flow of the deand increase by the size of the carried-out strea. Depending on distribution of tie of life of deands filling of a network can proceed in several odes, however the stationary ode when siultaneous nuber of deands in a network big, soeties there are refusals is ost of all interesting, the size of the axiu strea is soeties reached, but ass refusals aren't present; unevenness easure size depending on the carried-out deands a constant. By results of filling of networks with various algoriths of filling it is possible to draw a conclusion that use of algoriths of incut and arc approach will be ore effective for networks with a big initial capacity of arches (ore than 150) and for a sufficient large nuber of couples of poles (ore than 15). Duration of the stationary ode and tie of effective network functioning is ore when using incut algoriths. 5 Conclusions The ethodology of the analysis of telecounication networks (and not only, and in general, strea networks) allowing to investigate characteristics of a network in general, in particular, its total capacity depending on application of this or that policy of routing is created. The ethodology is realized in the for of the atheatical odel iitating process of consecutive filling of a telecounication network with counication channels by eans of various algoriths of routing. Algoriths of routing are original and in fact heuristic. All of the are directed on the axiu increase in a total general strea on a network and divided into two groups inial cut in which belonging of edges of a network to the iniu cuts between the corresponding couples of poles, and arc in which only the current capacity of edges of a network is considered is considered. eferences Fulkerson, D.., & Ford, L.. (1962). Flows in networks. New Jersey: Princeton University Pres. 172

8 Different criteria of dynaic routing... Grinberg, Y.., & Kurochkin, I. I. (2009). atheatical odeling of dynaic networks of sequential filling of streas due. Probles of coputations in the distributed edia: Proceedings of ISA AS(vol.46), p Grinberg, Y.., & Kurochkin, I. I. (2009). The study of the results of atheatical odeling of networks with sequential filling of the cluster topology. Probles of coputations in the distributed edia: Proceedings of ISA AS(vol.46), p Grinberg, Y.., Kurochkin, I. I., & Korkh, A. V. (2012). Theory and Practice of the Syste Analysis. Selection of clusters in networks with dynaic flows filling, vol.1, pp ybinsk. Hu, T. C. (1970). Integer Prograing and Network Flows. Ivnitsky, V. A. (2004). Theory of queueing network. oscow: Physatlit. artynov, I. A., Vatutin, E. I., & Titiov, V. S. (2014). Eighth World Conference on Intelligent Systes for Industrial Autoation. Hardware oriented classification of binary relations of graph-schees of parallel algoriths. Tashkent. 173

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

A Hybrid Network Architecture for File Transfers

A Hybrid Network Architecture for File Transfers JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,

More information

Generating Mechanisms for Evolving Software Mirror Graph

Generating Mechanisms for Evolving Software Mirror Graph Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror

More information

The Internal Conflict of a Belief Function

The Internal Conflict of a Belief Function The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of

More information

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage 216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent

More information

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

News Events Clustering Method Based on Staging Incremental Single-Pass Technique

News Events Clustering Method Based on Staging Incremental Single-Pass Technique News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Feature Based Registration for Panoramic Image Generation

Feature Based Registration for Panoramic Image Generation IJCSI International Journal of Coputer Science Issues, Vol. 10, Issue 6, No, Noveber 013 www.ijcsi.org 13 Feature Based Registration for Panoraic Iage Generation Kawther Abbas Sallal 1, Abdul-Mone Saleh

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS Evaluation of the Tiing Properties of Two Control Networs: CAN and PROFIBUS Max Mauro Dias Santos 1, Marcelo Ricardo Steer 2 and Francisco Vasques 3 1 UnilesteMG, CEP 35170-056, Coronel Fabriciano MG Brasil.

More information

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

Data Caching for Enhancing Anonymity

Data Caching for Enhancing Anonymity Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

MAC schemes - Fixed-assignment schemes

MAC schemes - Fixed-assignment schemes MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on

More information

A wireless sensor network for visual detection and classification of intrusions

A wireless sensor network for visual detection and classification of intrusions A wireless sensor network for visual detection and classification of intrusions ANDRZEJ SLUZEK 1,3, PALANIAPPAN ANNAMALAI 2, MD SAIFUL ISLAM 1 1 School of Coputer Engineering, 2 IntelliSys Centre Nanyang

More information

Multipath Selection and Channel Assignment in Wireless Mesh Networks

Multipath Selection and Channel Assignment in Wireless Mesh Networks Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,

More information

IN many interactive multimedia streaming applications, such

IN many interactive multimedia streaming applications, such 840 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, MAY 06 A Geoetric Approach to Server Selection for Interactive Video Streaing Yaochen Hu, Student Meber, IEEE, DiNiu, Meber, IEEE, and Zongpeng Li, Senior

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao

More information

A simplified approach to merging partial plane images

A simplified approach to merging partial plane images A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D

More information

On the Computation and Application of Prototype Point Patterns

On the Computation and Application of Prototype Point Patterns On the Coputation and Application of Prototype Point Patterns Katherine E. Tranbarger Freier 1 and Frederic Paik Schoenberg 2 Abstract This work addresses coputational probles related to the ipleentation

More information

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

Privacy-preserving String-Matching With PRAM Algorithms

Privacy-preserving String-Matching With PRAM Algorithms Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,

More information

Distributed Multicast Tree Construction in Wireless Sensor Networks

Distributed Multicast Tree Construction in Wireless Sensor Networks Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,

More information

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive and Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive and Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

Equation Based Congestion Control for Video Transmission over WCDMA Networks

Equation Based Congestion Control for Video Transmission over WCDMA Networks Equation Based Congestion Control for Video Transission over WCDMA Networks Antonios Alexiou, Diitrios Antonellis and Christos Bouras Research Acadeic Coputer Technology Institute, Greece and Coputer Engineering

More information

FINITE STATE DESCRIPTION OF COMMUNICATION PROTOCOLS*

FINITE STATE DESCRIPTION OF COMMUNICATION PROTOCOLS* irnper neuvork protocols. A. Danthine. editor, 'iniversite de liege. I'->7X. F3 FINITE STATE DESCRIPTION OF COMMUNICATION PROTOCOLS* Gregor V. Bochann Departeent de Matheatiques Ecole Polytechnique Federals

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium 1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource

More information

Feature Selection to Relate Words and Images

Feature Selection to Relate Words and Images The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University

More information

Novel Image Representation and Description Technique using Density Histogram of Feature Points

Novel Image Representation and Description Technique using Density Histogram of Feature Points Novel Iage Representation and Description Technique using Density Histogra of Feature Points Keneilwe ZUVA Departent of Coputer Science, University of Botswana, P/Bag 00704 UB, Gaborone, Botswana and Tranos

More information

6.1 Topological relations between two simple geometric objects

6.1 Topological relations between two simple geometric objects Chapter 5 proposed a spatial odel to represent the spatial extent of objects in urban areas. The purpose of the odel, as was clarified in Chapter 3, is ultifunctional, i.e. it has to be capable of supplying

More information

A Novel 2D Texture Classifier For Gray Level Images

A Novel 2D Texture Classifier For Gray Level Images 2012, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.co A Novel 2D Texture Classifier For Gray Level Iages B.S. Mousavi 1 Young Researchers Club, Zahedan

More information

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish,

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish, A Generic Architecture for Prograable Trac Shaper for High Speed Networks Krishnan K. Kailas y Ashok K. Agrawala z fkrish, agrawalag@cs.ud.edu y Departent of Electrical Engineering z Departent of Coputer

More information

TALLINN UNIVERSITY OF TECHNOLOGY, INSTITUTE OF PHYSICS 17. FRESNEL DIFFRACTION ON A ROUND APERTURE

TALLINN UNIVERSITY OF TECHNOLOGY, INSTITUTE OF PHYSICS 17. FRESNEL DIFFRACTION ON A ROUND APERTURE 7. FRESNEL DIFFRACTION ON A ROUND APERTURE. Objective Exaining diffraction pattern on a round aperture, deterining wavelength of light source.. Equipent needed Optical workbench, light source, color filters,

More information

Medical Biophysics 302E/335G/ st1-07 page 1

Medical Biophysics 302E/335G/ st1-07 page 1 Medical Biophysics 302E/335G/500 20070109 st1-07 page 1 STEREOLOGICAL METHODS - CONCEPTS Upon copletion of this lesson, the student should be able to: -define the ter stereology -distinguish between quantitative

More information

QoS and Sensible Routing Decisions

QoS and Sensible Routing Decisions QoS and Sensible Routing Decisions Erol Gelenbe Dept. of Electrical & Electronic Engineering Iperial College London SW7 2BT e.gelenbe@iperial.ac.uk Abstract Network Quality of Service (QoS) criteria of

More information

Automatic Graph Drawing Algorithms

Automatic Graph Drawing Algorithms Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs

More information

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL

COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute

More information

EUROPEAN ETS TELECOMMUNICATION August 1995 STANDARD

EUROPEAN ETS TELECOMMUNICATION August 1995 STANDARD EUROPEAN ETS 300 428 TELECOMMUNICATION August 1995 STANDARD Source: ETSI TC-NA Reference: DE/NA-052619 ICS: 33.040 Key words: B-ISDN, ATM Broadband Integrated Services Digital Network (B-ISDN); Asynchronous

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

Author. Published. Journal Title DOI. Copyright Statement. Downloaded from. Griffith Research Online. Kandjani, Hadi, Wen, Larry, Bernus, Peter

Author. Published. Journal Title DOI. Copyright Statement. Downloaded from. Griffith Research Online. Kandjani, Hadi, Wen, Larry, Bernus, Peter Enterprise Architecture Cybernetics for Global Mining Projects: Reducing the Structural Coplexity of Global Mining Supply Networks via Virtual Brokerage Author Kandjani, Hadi, Wen, Larry, Bernus, Peter

More information

Improve Peer Cooperation using Social Networks

Improve Peer Cooperation using Social Networks Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding

More information

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks

An Adaptive Low-latency Power Management Protocol for Wireless Sensor Networks An Adaptive Low-latency Power Manageent Protocol for Wireless Sensor Networks Giuseppe Anastasi, Marco Conti*, Mario Di Francesco, Andrea Passarella* Pervasive Coputing & Networking Lab. (PerLab) Departent

More information

Leveraging Relevance Cues for Improved Spoken Document Retrieval

Leveraging Relevance Cues for Improved Spoken Document Retrieval Leveraging Relevance Cues for Iproved Spoken Docuent Retrieval Pei-Ning Chen 1, Kuan-Yu Chen 2 and Berlin Chen 1 National Taiwan Noral University, Taiwan 1 Institute of Inforation Science, Acadeia Sinica,

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION www.arpnjournals.co DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION N. Snehalatha 1 and Paul Rodrigues 2 1 School of Coputing, SRM University, Chennai, Tail Nadu, India 2 Departent

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S COPUTER GEERATED HOLOGRAS Optical Sciences 67 W.J. Dallas (onday, August 3, 004, 1:38 P) PART III: CHAPTER OE DIFFUSERS FOR CGH S Part III: Chapter One Page 1 of 8 Introduction Hologras for display purposes

More information

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math Sarter Balanced Assessent Consortiu s, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents

More information

Homework 1. An Introduction to Neural Networks

Homework 1. An Introduction to Neural Networks Hoework An Introduction to Neural Networks -785: Introduction to Deep Learning Spring 09 OUT: January 4, 09 DUE: February 6, 09, :59 PM Start Here Collaboration policy: You are expected to coply with the

More information

PROBABILISTIC LOCALIZATION AND MAPPING OF MOBILE ROBOTS IN INDOOR ENVIRONMENTS WITH A SINGLE LASER RANGE FINDER

PROBABILISTIC LOCALIZATION AND MAPPING OF MOBILE ROBOTS IN INDOOR ENVIRONMENTS WITH A SINGLE LASER RANGE FINDER nd International Congress of Mechanical Engineering (COBEM 3) Noveber 3-7, 3, Ribeirão Preto, SP, Brazil Copyright 3 by ABCM PROBABILISTIC LOCALIZATION AND MAPPING OF MOBILE ROBOTS IN INDOOR ENVIRONMENTS

More information

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,

More information

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH

NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

Optimized stereo reconstruction of free-form space curves based on a nonuniform rational B-spline model

Optimized stereo reconstruction of free-form space curves based on a nonuniform rational B-spline model 1746 J. Opt. Soc. A. A/ Vol. 22, No. 9/ Septeber 2005 Y. J. Xiao and Y. F. Li Optiized stereo reconstruction of free-for space curves based on a nonunifor rational B-spline odel Yi Jun Xiao Departent of

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Reconstruction of Time Series using Optimal Ordering of ICA Components

Reconstruction of Time Series using Optimal Ordering of ICA Components Reconstruction of Tie Series using Optial Ordering of ICA Coponents Ar Goneid and Abear Kael Departent of Coputer Science & Engineering, The Aerican University in Cairo, Cairo, Egypt e-ail: goneid@aucegypt.edu

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Ascending order sort Descending order sort

Ascending order sort Descending order sort Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract

More information

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The

More information

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem.

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem. Noveber 13, 2016 Geoetry. The Method of the enter of Mass (ass points): Solving probles using the Law of Lever (ass points). Menelaus theore. Pappus theore. M d Theore (Law of Lever). Masses (weights)

More information

Verifying the structure and behavior in UML/OCL models using satisfiability solvers

Verifying the structure and behavior in UML/OCL models using satisfiability solvers IET Cyber-Physical Systes: Theory & Applications Review Article Verifying the structure and behavior in UML/OCL odels using satisfiability solvers ISSN 2398-3396 Received on 20th October 2016 Revised on

More information

Impact of Network Delay Variations on Multicast Sessions with TCP-like Congestion Control

Impact of Network Delay Variations on Multicast Sessions with TCP-like Congestion Control Ipact of Network Delay Variations on Multicast Sessions with TCP-like Congestion Control Augustin Chaintreau y François Baccelli z Christophe Diot yy y Ecole Norale Supérieure 45 rue d Ul 75005 Paris FRANCE

More information

3 Conference on Inforation Sciences and Systes, The Johns Hopkins University, March, 3 Sensitivity Characteristics of Cross-Correlation Distance Metric and Model Function F. Porikli Mitsubishi Electric

More information

Weeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10

Weeks 1 3 Weeks 4 6 Unit/Topic Number and Operations in Base 10 Weeks 1 3 Weeks 4 6 Unit/Topic Nuber and Operations in Base 10 FLOYD COUNTY SCHOOLS CURRICULUM RESOURCES Building a Better Future for Every Child - Every Day! Suer 2013 Subject Content: Math Grade 3rd

More information

COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT

COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT B.BOOBA 1 Dr. T.V.GOPAL 2 1 Research Scholar, Assist. Professor(Sl.Gr),Departent of Coputer Applications, Easwari

More information

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient

More information

Modeling epidemic data diffusion for wireless mobile networks

Modeling epidemic data diffusion for wireless mobile networks WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Coun. Mob. Coput. (212) Published online in Wiley Online Library (wileyonlinelibrary.co)..2233 RESEARCH ARTICLE Modeling epideic data diffusion for wireless

More information

Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10]

Trees. Linear vs. Branching CSE 143. Branching Structures in CS. What s in a Node? A Tree. [Chapter 10] CSE 143 Trees [Chapter 10] Linear vs. Branching Our data structures so far are linear Have a beginning and an end Everything falls in order between the ends Arrays, lined lists, queues, stacs, priority

More information

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH Kulapraote Prathuchai Geoinforatics Center, Asian Institute of Technology, 58 Moo9, Klong Luang, Pathuthani, Thailand.

More information