Accelerating Motif Finding Problem using Grid Computing with Enhanced Brute Force

Size: px
Start display at page:

Download "Accelerating Motif Finding Problem using Grid Computing with Enhanced Brute Force"

Transcription

1 Acceerating Motif Finding Probem using Grid Computing with Enhanced Brute Force HM Faheem, PhD Associate Professor, Computer Systems Dept, Facuty of Computer and Information Sciences, Ain Shams University, Cairo, Egypt Abstract Motif finding probem is a major task to understand the mechanisms of gene expression reguation Motif is generay defined as a recurring pattern in the sequence of nuceotides or amino acids In the DNA sequence, it is usuay a short segment that occurs frequenty, but not required to be an exact copy for each occurrence This property of motif makes motif mining very difficut In fact, motif finding probem is proven to be NP- Compete Many agorithms fai to sove the we-known chaenge probem of finding a motif of ength 15 and has at most 4 mutations (15, 4) due to the huge runtime needed Others fai to distinguish the motif from background sequences Brute Force is one of the exact agorithms that never fai to find the motif, but it suffers from an intractabe running time In this paper, we present a nove approach to acceerate the motif finding probem using grid computing As grid computing makes avaiabe owcost high-performance computing (HPC) infrastructures, the best candidates for using such infrastructures are appications that require high computationa power, arge storage capacity, or fast and high-throughput networking The nature of motif finding probem is considered one of the perfect scenarios for grid computing We depoyed an enhanced version of the Brute Force; skip-brute Force running on EUMEDGRID infrastructure (Co- Funded project by the European Commission in the framework of FP6, with the aim of supporting the deveopment of a Grid e- Infrastructure in the Mediterranean Area and promoting the porting of computationay intensive appications on the Grid patform) The idea behind our skip Brute Force agorithm is that it skips a the iterations that wi not ead to a correct soution The message passing programming paradigm is depoyed since it assumes a partitioned address space and supports expicit paraeization Our experimenta resuts showed boosting in the performance without sacrificing the exactness of the Brute Force Keywords- Motif findin; DNA sequence anaysis; Grid Computing I Introduction Understanding the mechanisms that reguate gene expression is a major chaenge in bioogy Motif finding probem is considered an important task in this chaenge Addressing the compexity nature of the probem together with being very data intensive has encouraged introducing grid computing to the probem Grid computing is very powerfu in such computationay intensive tasks Many Agorithms are introduced to sove this probem They can be categorized into pattern-based and profie-based agorithms [1-3] Pattern-based agorithms incude PROJECTION [4,5], MULTIPROFILER [6], and MITRA [3] Profie-based agorithms incuding CONSENSUS [7], MEME [2] and Gibbs samping [5], try to find the starting positions of the occurrences of the motif in each sequence Athough these agorithms show good performance, they sti can fai to identify a the possibe motifs in the sequences They aso show poor performance when trying to sove the chaenge probem presented by Pvzner and Sze [8] Some of them fai due to oca search; others which are based on statistica measures fai to separate the motif from the background sequences We can aso categorize Motif finding agorithms due to the soution they provide Some agorithms provide exact soution others provide approximate one Brute Force agorithm is an exact agorithm It never misses a motif, as it aways searches in a the possibe ocations What makes Brute Force an impossibe soution is the intractabiity of its running time It increases exponentiay with the size of the required motif This makes the Brute Force unsuitabe for ong motifs Many approaches can be appied to speed up the running time of any agorithm using hardware; exampes incude chip mutiprocessors, graphics processing units (GPUs), (FPGAs), and specia hardware soutions These soutions require hardware speciaists who are abe to design such systems Moreover, it is not reaistic to design architecture for every singe bioinformatics probem In fact, the grid as an emerging infrastructure that provides seamess access to computing power and data storage capacity distributed over the different grid computing nodes is ideay quaified to knock the door of computationay intensive probems ike motif finding probem The rest of this paper is organized as foows: In Section II we describe the motif finding probem and the Brute Force agorithm In Section III, a brief expanation of the skip brute force agorithm is presented in addition to the expanation of the parae nature of the agorithm Section I describes the

2 grid-based impementation of the suggested approach Performance evauation is presented in section Finay, section I concudes our work and presents future enhancements II Motif finding probem The probem can be summarized as foows: Panted (,d)- Motif Probem: Find the motif consensus M which is a fixed but unknown nuceotide sequence of ength Suppose that M occurs once in each of t background sequences of common ength n Each occurrence of M is corrupted by exacty d point substitutions in positions chosen independenty at random Given the t sequences, recover the motif occurrences and the consensus M Pevzner and Sze[8] presented the chaenge probem(15,4) which makes a particuar parameterization to the panted motif probem The motif we are searching for is of ength =15, the aowed mutations d=4 and the number of sequences we are searching in is t=20 each of size n=600 The parameters of the chaenge probem are typica vaues for finding transcription factor binding sites in co-reguated gene promoter regions yeast [4] The Brute Force agorithm soves this probem by considering the set of a 4 possibe -mers It computes the tota distance of each -mer in that set to a other -mers in a t sequences The correct motif is the one that have the smaest tota distance aong a the other -mers The run time of this agorithm is O (4 nt) The running time for finding a motif of =11 is about 5hrs and it fais to hande onger motifs in reasonabe time To sove the chaenge probem, the running time of the Brute Force agorithm woud obviousy be too high III Enhanced Brute Force Agorithm- the skip Brute Force The idea behind our skip Brute Force agorithm is that it skips a the iterations that wi not ead to a correct soution The agorithm generates a possibe 4 -mers It then iterates over a the sequences examining the generated - mer with a the windows in the first sequence The agorithm then excudes a the generated -mers that are not matched with at east one window of the sequence Matching means that the hamming distance between the -mer and the window is ess than or equa to 4 In other words; a generated -mer of ength 15 with 4 permitted mutations is considered matched with a window if at east 12 identica positions at both of them are matched The agorithm then starts checking the next sequences and consequenty excudes unmatched -mers from the search in the next sequence The agorithm repeats this mechanism ti the end of the sequences A pseudo code of the sequentia skip Brute Force agorithm is shown in Fig1 The compexity of this agorithm is O(4 nt) at its worst case, just as the Brute Force The performance coefficient introduced by Pvzner and Sze to measure the performance is defined as foows: If K denotes the set of t, base positions in t occurrences of a panted motif, and P denotes the corresponding set of base positions in the t occurrences predicted by the agorithm Then the performance coefficient equas K P/KUP If the agorithm succeeds to recover a the positions of the panted motif correcty, this wi give a performance coefficient of 1, which is typicay the case of Brute Force The performance coefficient gives an indication of how many positions of the motif occurrences in the sequences have been predicted correcty by the agorithm 1for L = 0 to 4 _motifsize - 1 do % examine a possibe -mers 2 for Ti = 1 to t_sequences do % oop on a t sequences 3 motif_found = 0; 4 current_score =d_mutations; 5 for W = 1 to n_seqsize-_motifsize+1 do % oop on a windows 6 dist = compute_distance ( L, W); 7 if dist<= current_score 8 soutionmotif = Li; % this can be the motif 9 soutionposit(ti) = W; % save its position 10 motif_found = 1; % a suspected motif was found 11 current_score = dist; 12 if Ti = t_sequences % we reached the ast sequence 13 soution_found = 1; 14 end 15 end 16 if motif_found == 0 17 break; % Skip that Li, it is not the Motif 18 end 19 end 20 end 21 if soution_found 22 break; 23 end 24end Fig 1 Pseudo Code for Skip Brute Force Agorithm The brute force or skip-brute force agorithms are inherenty parae agorithms with we-defined points of synchronization and are thus we suited to impementation of Buk Synchronous Parae (BSP) computer A computer constructed with this paradigm is made up of a number of components each comprising three parts: parae threads, known as virtua processors; a point-to-point routing mechanism; and faciities for providing synchronization between some or a of the threads at a reguar time interva 2 The soution of a probem on the BSP computer consists of a number of super-steps, at one or more time intervas apart Fig2 shows the parae comparisons between the generated - mers and the windows of a given sequence on the components

3 (c) of the BSP mode [9] Of course a preiminary data preparation step shoud be performed before the start up of comparison processes This step extracts a the possibe windows from a given sequence Hence each -mer of the 4 - mers wi be compared with a the possibe (n-+1) windows The tota number of comparisons is (n + 1) * 4 Actuay there is no dependency between these comparison processes L-mer1,W1 Set of Possibe -mers L-mer1 : aaaaaaaaaaaaaaa L-mer2 : aaaaaaaaaaaaaac L-mer3 : aaaaaaaaaaaaaat L-mer4 : aaaaaaaaaaaaaag L-mer4 L : ggggggggggggggg L-mer1,W6 C1 P R C2 Comparison Process P R Sampe Sequence of Size 20: cctgatagacgctatctggc Possibe windows of size 15: Synchronization Contro Communication Medium W1: cctgatagacgctat W2: ctgatagacgctatc W3: tgatagacgctatct W4: gatagacgctatctg W5: atagacgctatctgg W6: tagacgctatctggc R=Point-t point Router P=Processor =irtua Processor (Thread) Cx P R L-mer4 L,W1 Fig2 Comparison processes using the BSP mode I Grid-based Impementation L-mer4 L,W6 The BSP mode was introduced to provide a bridge between software deveoped for parae machines and the architectures on which this software is utimatey impemented BSP was proposed as a possibe standard to faciitate the deveopment of genera purpose parae machines and increase the portabiity of software between these machines In order to impement the motif finding probem on a specific grid node consisting of mutipe computers, we have to correate the eements of the grid node to the components of the BSP [9] The message-passing programming paradigm is one of the odest and most widey used approaches for programming parae computers Its wide spread adoption can be attributed to the fact that it imposes minima requirements on the underying hardware The two key attributes that characterize the message-passing programming paradigm are: it assumes a partitioned address space; and it supports ony expicit paraeism The messagepassing interface MPI defines a standard ibrary for messagepassing that can be used to deveop portabe message-passing programs using either C or FORTRAN Most messagepassing programs are written using the singe program mutipe data (SPMD) approach In the SPMD programs the code executed by different processes is identica except for a sma number of processes We can obviousy see that the BSP mode components have the same attributes of the message-passing programming paradigm This makes the message-passing programming paradigm is the optimum choice for impementing the skip brute force agorithm on the grid [10] A EUMEDGRID Structure A set of grid nodes is impemented at different Mediterranean countries EUMEDGRID depoys gite as a stack of generic middeware Main gite components incude user interface giteui, virtua organization management service OMS, information service, workoad management system gitewms, ogging and bookkeeping utiity gitelb, computing services, data management, monitoring services, and secure access services Typica grid node structure is shown in Fig3 User Interface aows users to access Grid functionaities It is simpy a machine where users have a persona account and where the user certificate is instaed It is aso a gateway to grid services The user interface provides a command ine interface to perform some basic Grid operations such as: ist a the resources suitabe to execute a given job, submit jobs for execution, show the status of submitted jobs, cance one or more jobs, retrieve the ogging and bookkeeping information of jobs, retrieve the output of finished jobs, and copy, repicate and deete fies from grid The resource broker (RB) is responsibe for the acceptance of submitted jobs and for sending those jobs to the appropriate computing eement The resource broker retrieves information from Information cataogues so as to find the proper avaiabe resources depending on the job requirements Job s Submission UI RB WN CE Fig3 Grid Node Structure WN WN The computing eement (CE) is considered the Grid interface It is buit on a farm of computing nodes caed Worker Nodes It aso executes the basic queues functions The computing eement is responsibe for accepting jobs and dispatching them for execution to the worker nodes The state of an executing job is being watched by the Computing Eement LCGCE is the current CE service impementation of the production infrastructure, based on Gobus tookit The submitted jobs are being executed in the worker nodes (WN) Ony basic services of middeware are required in the Worker nodes such as: appication ibraries, Appication Programming Interfaces (API), and commands for performing actions on grid resources and data SE

4 The storage eement (SE) provides uniform access to storage resources It may contro simpe disk servers, arge disk arrays or Mass Storage Systems Information service provides information about the Grid resources and their status Monitoring service has a set of monitoring toos designed for grid systems It provides basic data about Grid ike the number of each site s CPUs, the number of submitted jobs, the number of executing jobs, the number of waiting jobs, the number of each site s free CPU, the avaiabe storage space, etc Secure access service decides resource access poicy, authentication, an authorization mechanisms B MPI Program Based on the nature of the probem and the huge number of concurrent comparisons, we introduced a nove approach Since a the impementations of agorithms simiar in nature to brute force are based on the generation of the possibe - mers through oops, we here assumed that the possibe -mers are distributed eveny among the different worker nodes On the other hand, a the sequences wi be submitted to a the worker nodes This means that each worker node wi have a compete set of a the sequences and a portion of the possibe -mers Typica execution steps after data distribution of both the -mers and the sequences are isted in Fig 4 Step 1: For a worker nodes; expand each sequence to provide(n-+1) windows Step 2: For a worker nodes; perform the comparison process between each window of the first sequence and the resident -mers of the worker node Step 3: For a worker nodes; excude the unmatched -mers Step 4: Repeat steps 2 and 3 on the next sequence unti the end of sequences Step 5: Coect resuts and then dispay it Fig4 MPI Program steps for impementing skip brute force Performance Evauation and Resuts A test of the performance of the Skip Brute Force agorithm on synthetic probem instances is performed Probem instances are generated according to the panted (, d)-motif mode We foowed up the FM mode described by Pvzner and Sze[8] Probem instances are produced as foows: First, a motif consensus M of ength is chosen by picking bases at random Second, t=20 occurrences of the motif are created by randomy choosing d positions per occurrence (without repacement) and mutating the base at each chosen position to a different, randomy chosen base Third, we construct t background sequences of ength n=600 using n*t bases chosen at random Finay, we assign each motif occurrence to a random position in a background sequence, one occurrence per sequence A random choices are made uniformy and independenty with equa base frequencies For each set of parameter and d, we ran 10 test cases and recorded the average running time of each agorithm In order to evauate the grid-based impementation; we need to define the expected number of matching operations First we define the probabiity P d to find a random -mer in a given sequence with up to d mutations [2] This is shown in (1) Additionay, we define the expected number of the required matching operations E(, d) to find the correct impanted motif as in (2) We then deduce for a probem of size n=600, t=20, the expected matching operations to be as in tabe 1 P d = (1) E(,d) = (2) Matching operations constitute the most time consuming part of the agorithms athough it coud be performed concurrenty Unit matching time is defined as the time required carrying out a set of comparisons in order to decide whether an -mer is matched with a corresponding window of a given sequence or not Unit matching time depends of course on the ength of the window A comparison process for an - mer of size 15 wi be different from that of ength 11 Typica Unit Matching Time running on Dua Core, 25 GHz, 2GB RAM (the defaut machine specifications for a the worker nodes in our experiments) for different and d vaues is shown in Tabe 2 Tabe 1: Expected matching operations for different (, d) d Expected Matching Operations x x x x x Assuming that the sequences and the possibe -mers are initiay stored as data fies on the computers, a typica anaysis of the expected sequentia impementation time T s of Skip Brute Force agorithm on a singe computer machine is given by (3) T s = T expand + T comp + T save (3) Where; T expand is the time needed to expand the sequences such that a compete set of windows is generated for each sequence, T comp is the time needed to perform comparison processes, and T save is the time needed to save the resuts to a data fie The MPI impementation time T MPI on the grid is given by (4): T MPI = T expand + (T comp /P) + (T save /P) + T comm (4)

5 Where; P is the number of worker nodes, and T comm is the communication and synchronization time of the depoyed grid eements Tabe 2: Unit Matching Time d Unit Matching Time E E E E E-07 A Experimenta Resuts Typica experimenta resuts for the execution time of skip Brute Force agorithm on a singe, 24, and 96 worker nodes are isted in tabes 3, 4, and 5 respectivey It is cear that as increases, the execution time increases Aso we can see that as the number of WNs increases, the execution time decreases whie the communication time increases Typica LAN setup of the computationa grid node on which we conducted our experiments consists of 4 LAN switch each has 24 10/100 Mbps UTP ports and 4 ports each of 1Gbps (upink modues) A typica star topoogy is impemented such that one switch connects the other 3 switches Each switch connects 24 WNs with a rate of 100 Mbps for each WN Tabe 3: Impementing the skip Brute Force Agorithm on a singe machine d T expand T comp P=1 T save Ts Tabe 4: Impementing the skip Brute Force Agorithm on computing grid has 24 Worker Nodes d T comp T save P=24 T comm T MPI B Performance Evauation speedup of an agorithm using P processors is defined as S P = t s / t P where t s is the execution time of the best avaiabe sequentia agorithm and t P is the execution time of the parae agorithm Amdah s aw states that the speedup given P processors is as in (5) S P = T s / ( f T s + (1-f) T s / P ) = P / ( 1 + (P-1)f ) (5) Where; f is the fraction of the computation that is sequentia and cannot be divided into concurrent tasks It is obvious that f is directy proportiona to T expand, and T comm Aso f is inversey proportiona with the probem size since the tota sequentia execution time is affected by it Hence; f is given by (6) f = (T expand + T comm )/ T s (6) Tabe 6 shows the Speedup S P for different and d It is cear that the impementation of the motif finding probem using skip brute force on the grid yieds a considerabe enhancement in the speed of the agorithm Tabe 5: Impementing the skip Brute Force Agorithm on computing grid has 96 Worker Nodes D T comp T save P=96 T comm T MPI On the other hand, severa impementations for soving motif finding probem on Matab can be used in comparisons Of course much more enhancement is achieved if we compared our resuts with the Matab impementation of Brute Force agorithm running on an AMD 5500 X2+ processor and 2GB RAM This is shown in Tabe 7 We can see that a boost factor of 6419 is achieved when 96 worker nodes are depoyed as compared to the run time of Matab impementation Tabe 6: Speedup S P for different, d, and f vaues P=24 P=96 d f Sp f Sp

6 I Concusion and Future Directions Motif finding probem has been considered as one of the most chaenging research topics for the scientists of bioinformatics In this paper, we presented a grid-based soution that aimed at speeding up the soution of the probem We introduced an enhanced version of the Brute Force agorithm caed skip Brute Force We depoyed message-pass interface to paraeize the probem We then impemented the soution on EUMEDGRID infrastructure Resuts showed the achievement in terms of execution time such that the gridbased impementation provides a good speedup factor We can see that the experiment is conducted on a norma infrastructure that consists of traditiona PCs connected to LAN switches and MPI code written in C anguage This means that no need for speciaized or sophisticated hardware infrastructures that costs very much [6] E Eskin and P Pvzner, Finding composite reguatory patterns in DNA sequences, Bioinformatics S1, , 2002 [7] G Hertz, G Stormo, Identifying DNA and protein patterns with statisticay significant aignments of mutipe sequences, Bioinformatics 15(7-8), , 1999 [8] P Pvzner and S H Sze, Combinatoria approaches to finding subte signas in DNA sequences, in the Proceedings of the 8th Internationa Conference on Inteigent Systems for Moecuar Bioogy, , 2000 [9] A Chamers and J Tidmus, Practica Parae rocessing, An Introduction to Probem Soving in Parae, Internationa Thomson Computer Press, 1996 [10] A Grama, A Gupta, J Karypis, and Kumar, Introduction to Parae Computing,, 2 nd Edition, Addison Wesey Pubishing Inc, 2003 We strongy beieve that such appicabiity of grid computing can greaty improve the way the bioinformatics research is impemented This paper is a step towards a compete suite of grid-based impementations in the fied of bioinformatics Tabe 7: Comparison with Matab Resuts d Matab Run Time TMPI P=24 P=96 Boost Factor TMPI Boost Factor REFERENCES [1] SRajasekaran, S Baa, and CH Huang, Exact agorithm for panted motif chaenge probems, in the Proceedings of Asia-Pacific Bioinformatics Conference, , 2005 [2] T L Baiey, N Wiiams, C Miseh, and W W Li, MEME: discovering and anayzing DNA and protein motifs, Nuceic Acid Research 34, W369 W373, 2006 [3] A Brazma, I Jonassen, J io, and E Ukkonen, Predicting gene reguatory eements in siico on a genomic scae, Genome Research 15, , 1998 [4] J Buher, M Tompa, Finding motifs using random projections, Journa of Computing Bioogy, o 9, pp , 2002 [5] C E Lawrence, S F Atschu, M S Boguski, J S Liu, A F Neuwad, and J C Wootton, Detecting subte sequence signas: a Gibbs samping strategy for mutipe aignment, Science 262, , 1993

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

(0,l) (0,0) (l,0) (l,l)

(0,l) (0,0) (l,0) (l,l) Parae Domain Decomposition and Load Baancing Using Space-Fiing Curves Srinivas Auru Fatih E. Sevigen Dept. of CS Schoo of EECS New Mexico State University Syracuse University Las Cruces, NM 88003-8001

More information

An Introduction to Design Patterns

An Introduction to Design Patterns An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture

More information

UnixWare 7 System Administration UnixWare 7 System Configuration

UnixWare 7 System Administration UnixWare 7 System Configuration UnixWare 7 System Administration - CH 3 - UnixWare 7 System Configuration Page 1 of 8 [Figures are not incuded in this sampe chapter] UnixWare 7 System Administration - 3 - UnixWare 7 System Configuration

More information

Automatic Hidden Web Database Classification

Automatic Hidden Web Database Classification Automatic idden Web atabase Cassification Zhiguo Gong, Jingbai Zhang, and Qian Liu Facuty of Science and Technoogy niversity of Macau Macao, PRC {fstzgg,ma46597,ma46620}@umac.mo Abstract. In this paper,

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

Sample of a training manual for a software tool

Sample of a training manual for a software tool Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

MCSE Training Guide: Windows Architecture and Memory

MCSE Training Guide: Windows Architecture and Memory MCSE Training Guide: Windows 95 -- Ch 2 -- Architecture and Memory Page 1 of 13 MCSE Training Guide: Windows 95-2 - Architecture and Memory This chapter wi hep you prepare for the exam by covering the

More information

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162 oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,

More information

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Server Reease Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Tuxedo Connector Reease 1.0 Document Date: June 29, 2001 Copyright Copyright 2001 BEA Systems, Inc. A Rights Reserved. Restricted

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Lecture 4: Threads

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Lecture 4: Threads CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Lecture 4: Threads Announcement Project 0 Due Project 1 out Homework 1 due on Thursday Submit it to Gradescope onine 2 Processes Reca that

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

Windows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture

Windows NT, Terminal Server and Citrix MetaFrame Terminal Server Architecture Windows NT, Termina Server and Citrix MetaFrame - CH 3 - Termina Server Architect.. Page 1 of 13 [Figures are not incuded in this sampe chapter] Windows NT, Termina Server and Citrix MetaFrame - 3 - Termina

More information

A Method for Calculating Term Similarity on Large Document Collections

A Method for Calculating Term Similarity on Large Document Collections $ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information

More information

Genetic Algorithms for Parallel Code Optimization

Genetic Algorithms for Parallel Code Optimization Genetic Agorithms for Parae Code Optimization Ender Özcan Dept. of Computer Engineering Yeditepe University Kayışdağı, İstanbu, Turkey Emai: eozcan@cse.yeditepe.edu.tr Abstract- Determining the optimum

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

Dynamic Symbolic Execution of Distributed Concurrent Objects

Dynamic Symbolic Execution of Distributed Concurrent Objects Dynamic Symboic Execution of Distributed Concurrent Objects Andreas Griesmayer 1, Bernhard Aichernig 1,2, Einar Broch Johnsen 3, and Rudof Schatte 1,2 1 Internationa Institute for Software Technoogy, United

More information

Research of Classification based on Deep Neural Network

Research of  Classification based on Deep Neural Network 2018 Internationa Conference on Sensor Network and Computer Engineering (ICSNCE 2018) Research of Emai Cassification based on Deep Neura Network Wang Yawen Schoo of Computer Science and Engineering Xi

More information

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

Quality of Service Evaluations of Multicast Streaming Protocols *

Quality of Service Evaluations of Multicast Streaming Protocols * Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu

More information

Efficient Histogram-based Indexing for Video Copy Detection

Efficient Histogram-based Indexing for Video Copy Detection Efficient Histogram-based Indexing for Video Copy Detection Chih-Yi Chiu, Jenq-Haur Wang*, and Hung-Chi Chang Institute of Information Science, Academia Sinica, Taiwan *Department of Computer Science and

More information

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Introducing a Target-Based Approach to Rapid Prototyping of ECUs

Introducing a Target-Based Approach to Rapid Prototyping of ECUs Introducing a Target-Based Approach to Rapid Prototyping of ECUs FEBRUARY, 1997 Abstract This paper presents a target-based approach to Rapid Prototyping of Eectronic Contro Units (ECUs). With this approach,

More information

Readme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT

Readme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT Reease 11.1.2.4.000 Readme CONTENTS IN BRIEF Purpose... 2 New Features in This Reease... 2 Instaation Information... 2 Supported Patforms... 2 Supported

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework

Utility-based Camera Assignment in a Video Network: A Game Theoretic Framework This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Y.LI AND B.BHANU CAMERA ASSIGNMENT: A GAME-THEORETIC

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM

THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM 17th European Signa Processing Conference (EUSIPCO 2009) Gasgow, Scotand, August 24-28, 2009 THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM P. Murray 1, S. Marsha 1, and E.Buinger 2 1 Dept. of Eectronic

More information

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method 297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,

More information

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal

Authorization of a QoS Path based on Generic AAA. Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taal Abstract Authorization of a QoS Path based on Generic Leon Gommans, Cees de Laat, Bas van Oudenaarde, Arie Taa Advanced Internet Research Group, Department of Computer Science, University of Amsterdam.

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Blackboard Mechanism Based Ant Colony Theory for Dynamic Deployment of Mobile Sensor Networks

Blackboard Mechanism Based Ant Colony Theory for Dynamic Deployment of Mobile Sensor Networks Journa of Bionic Engineering 5 (2008) 197 203 Bacboard Mechanism Based Ant Coony Theory for Dynamic Depoyment of Mobie Sensor Networs Guang-ping Qi, Ping Song, Ke-jie Li Schoo of Aerospace Science and

More information

A Top-to-Bottom View: Energy Analysis for Mobile Application Source Code

A Top-to-Bottom View: Energy Analysis for Mobile Application Source Code A Top-to-Bottom View: Energy Anaysis for Mobie Appication Source Code Xueiang Li John P. Gaagher Roskide University Emai: {xueiang, jpg}@ruc.dk arxiv:1510.04165v1 [cs.oh] 14 Oct 2015 Abstract Energy efficiency

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions

A New Supervised Clustering Algorithm Based on Min-Max Modular Network with Gaussian-Zero-Crossing Functions 2006 Internationa Joint Conference on Neura Networks Sheraton Vancouver Wa Centre Hote, Vancouver, BC, Canada Juy 16-21, 2006 A New Supervised Custering Agorithm Based on Min-Max Moduar Network with Gaussian-Zero-Crossing

More information

Low Traffic Overlay Networks with Large Routing Tables

Low Traffic Overlay Networks with Large Routing Tables Low Traffic Overay Networks with Large Routing Tabes Chunqiang Tang, Meissa J. Buco, Rong N. Chang, Sandhya Dwarkadas, Laura Z. Luan, Edward So, and Christopher Ward ABSTRACT The routing tabes of Distributed

More information

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks.

Massively Parallel Part of Speech Tagging Using. Min-Max Modular Neural Networks. assivey Parae Part of Speech Tagging Using in-ax oduar Neura Networks Bao-Liang Lu y, Qing a z, ichinori Ichikawa y, & Hitoshi Isahara z y Lab. for Brain-Operative Device, Brain Science Institute, RIEN

More information

Pneumo-Mechanical Simulation of a 2 Dof Planar Manipulator

Pneumo-Mechanical Simulation of a 2 Dof Planar Manipulator Pneumo-Mechanica Simuation of a 2 Dof Panar Manipuator Hermes GIBERTI, Simone CINQUEMANI Mechanica Engineering Department, Poitecnico di Miano, Campus Bovisa Sud, via La Masa 34, 2156, Miano, Itay ABSTRACT

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

LEARNING causal structures is one of the main problems

LEARNING causal structures is one of the main problems cupc: CUDA-based Parae PC Agorithm for Causa Structure Learning on PU Behrooz Zare, Foad Jafarinejad, Matin Hashemi, and Saber Saehkaeybar arxiv:8.89v [cs.dc] Dec 8 Abstract The main goa in many fieds

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing

More information

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER!

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER! [1,2] have, in theory, revoutionized cryptography. Unfortunatey, athough offer many advantages over conventiona and authentication), such cock synchronization in this appication due to the arge operand

More information

Reference trajectory tracking for a multi-dof robot arm

Reference trajectory tracking for a multi-dof robot arm Archives of Contro Sciences Voume 5LXI, 5 No. 4, pages 53 57 Reference trajectory tracking for a muti-dof robot arm RÓBERT KRASŇANSKÝ, PETER VALACH, DÁVID SOÓS, JAVAD ZARBAKHSH This paper presents the

More information

COS 318: Operating Systems. Virtual Memory Design Issues: Paging and Caching. Jaswinder Pal Singh Computer Science Department Princeton University

COS 318: Operating Systems. Virtual Memory Design Issues: Paging and Caching. Jaswinder Pal Singh Computer Science Department Princeton University COS 318: Operating Systems Virtua Memory Design Issues: Paging and Caching Jaswinder Pa Singh Computer Science Department Princeton University (http://www.cs.princeton.edu/courses/cos318/) Virtua Memory:

More information

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network Service Chain (SC) Mapping with Mutipe SC Instances in a Wide Area Network This is a preprint eectronic version of the artice submitted to IEEE GobeCom 2017 Abhishek Gupta, Brigitte Jaumard, Massimo Tornatore,

More information

Portable Compiler Optimisation Across Embedded Programs and Microarchitectures using Machine Learning

Portable Compiler Optimisation Across Embedded Programs and Microarchitectures using Machine Learning Portabe Compier Optimisation Across Embedded Programs and Microarchitectures using Machine Learning Christophe Dubach, Timothy M. Jones, Edwin V. Bonia Members of HiPEAC Schoo of Informatics University

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

Community-Aware Opportunistic Routing in Mobile Social Networks

Community-Aware Opportunistic Routing in Mobile Social Networks IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract

More information

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi

More information

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES

FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES FREE-FORM ANISOTROPY: A NEW METHOD FOR CRACK DETECTION ON PAVEMENT SURFACE IMAGES Tien Sy Nguyen, Stéphane Begot, Forent Ducuty, Manue Avia To cite this version: Tien Sy Nguyen, Stéphane Begot, Forent

More information

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002*

RDF Objects 1. Alex Barnell Information Infrastructure Laboratory HP Laboratories Bristol HPL November 27 th, 2002* RDF Objects 1 Aex Barne Information Infrastructure Laboratory HP Laboratories Bristo HPL-2002-315 November 27 th, 2002* E-mai: Andy_Seaborne@hp.hp.com RDF, semantic web, ontoogy, object-oriented datastructures

More information

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?

Intro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program? Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of

More information

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing An Adaptive Two-Copy Deayed SR-ARQ for Sateite Channes with Shadowing Jing Zhu, Sumit Roy zhuj@ee.washington.edu Department of Eectrica Engineering, University of Washington Abstract- The paper focuses

More information

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x

Register Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Register Aocation Consider the foowing assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Assume that two registers are avaiabe. Starting from the eft a compier woud generate

More information

Chapter 3: KDE Page 1 of 31. Put icons on the desktop to mount and unmount removable disks, such as floppies.

Chapter 3: KDE Page 1 of 31. Put icons on the desktop to mount and unmount removable disks, such as floppies. Chapter 3: KDE Page 1 of 31 Chapter 3: KDE In This Chapter What Is KDE? Instaing KDE Seecting KDE Basic Desktop Eements Running Programs Stopping KDE KDE Capabiities Configuring KDE with the Contro Center

More information

CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research

CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research CERIAS Tech Report 2003-50 Repicated Parae I/O without Additiona Scheduing Costs by Mikhai J. Ataah Center for Education and Research Information Assurance and Security Purdue University, West Lafayette,

More information

Development of a hybrid K-means-expectation maximization clustering algorithm

Development of a hybrid K-means-expectation maximization clustering algorithm Journa of Computations & Modeing, vo., no.4, 0, -3 ISSN: 79-765 (print, 79-8850 (onine Scienpress Ltd, 0 Deveopment of a hybrid K-means-expectation maximization custering agorithm Adigun Abimboa Adebisi,

More information

Navigating and searching theweb

Navigating and searching theweb Navigating and searching theweb Contents Introduction 3 1 The Word Wide Web 3 2 Navigating the web 4 3 Hyperinks 5 4 Searching the web 7 5 Improving your searches 8 6 Activities 9 6.1 Navigating the web

More information

Tracing Application Program Execution on the Cray X-MP and Cray 2

Tracing Application Program Execution on the Cray X-MP and Cray 2 Tracing Appication Program Execution on the Cray X-MP and Cray 2 Aen D. Maony John L. Larson+ Danie A. Reed* Center for Supercomputer Research and Deveopment University of Iinois Urbana, Iinois 61801 Abstract

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

IBC DOCUMENT PROG007. SA/STA SERIES User's Guide V7.0

IBC DOCUMENT PROG007. SA/STA SERIES User's Guide V7.0 IBC DOCUMENT SA/STA SERIES User's Guide V7.0 Page 2 New Features for Version 7.0 Mutipe Schedues This version of the SA/STA firmware supports mutipe schedues for empoyees. The mutipe schedues are impemented

More information

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014 5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 014 Topoogy-Transparent Scheduing in Mobie Ad Hoc Networks With Mutipe Packet Reception Capabiity Yiming Liu, Member, IEEE,

More information

IBM Research Report. On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overlay Networks

IBM Research Report. On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overlay Networks RC355 (W5-4) February 4, 5 Computer Science IBM Research Report On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overay Networks Chunqiang Tang, Meissa J.

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Endoscopic Motion Compensation of High Speed Videoendoscopy

Endoscopic Motion Compensation of High Speed Videoendoscopy Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High

More information

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The

More information

Complex Human Activity Searching in a Video Employing Negative Space Analysis

Complex Human Activity Searching in a Video Employing Negative Space Analysis Compex Human Activity Searching in a Video Empoying Negative Space Anaysis Shah Atiqur Rahman, Siu-Yeung Cho, M.K.H. Leung 3, Schoo of Computer Engineering, Nanyang Technoogica University, Singapore 639798

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Internet Contro Message Protoco (ICMP), RFC 792

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS Etienne Cornu 1, Aain Dufaux 2, and David Hermann 1 1 AMI Semiconductor Canada, 611 Kumpf Drive,

More information

Split Restoration with Wavelength Conversion in WDM Networks*

Split Restoration with Wavelength Conversion in WDM Networks* Spit Reoration with aveength Conversion in DM Networks* Yuanqiu Luo and Nirwan Ansari Advanced Networking Laborator Department of Eectrica and Computer Engineering New Jerse Initute of Technoog Universit

More information

ECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018

ECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 ECEn 528 Prof. Archibad Lab: Dynamic Scheduing Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 Overview This ab's purpose is to expore issues invoved in the design of out-of-order issue processors.

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

Published in: Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, April, 2003

Published in: Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, April, 2003 Aaborg Universitet Compressed Domain Packet Loss Conceament of Sinusoiday Coded Speech Rødbro, Christoffer Asgaard; Christensen, Mads Græsbø; Andersen, Søren Vang; Jensen, Søren Hodt Pubished in: Proc.

More information

Guardian 365 Pro App Guide. For more exciting new products please visit our website: Australia: OWNER S MANUAL

Guardian 365 Pro App Guide. For more exciting new products please visit our website: Australia:   OWNER S MANUAL Guardian 365 Pro App Guide For more exciting new products pease visit our website: Austraia: www.uniden.com.au OWNER S MANUAL Privacy Protection Notice As the device user or data controer, you might coect

More information

Priority Queueing for Packets with Two Characteristics

Priority Queueing for Packets with Two Characteristics 1 Priority Queueing for Packets with Two Characteristics Pave Chuprikov, Sergey I. Nikoenko, Aex Davydow, Kiri Kogan Abstract Modern network eements are increasingy required to dea with heterogeneous traffic.

More information