Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Size: px
Start display at page:

Download "Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm"

Transcription

1 International Journal of Engineering and Technical Research (IJETR) ISSN: (O) (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University of Calabar Using a Modified Dijkstra s Algorith Ofe O A, Edi E A, Ele S I, Abstract The proble of finding the shortest path between two odes is a well known proble in network analysis Optial routing has been widely studied for interconnection network This research considers the proble of finding the shortest path in a wireless packet switch network syste in the University of Calabar environent, Calabar, Nigeria Its theoretical approach, ipleentation and application First a historical background of sp algorith was given and basic concepts of network analysis in connection with congestion and delay issues were explored for the later use The report was concentrated on the odified Dijkstra s algorith and the open shortest path first (OSPF) algorith, use in finding single source shortest path in a one-to-all undirected wireless packet switch network syste in the University of Calabar environent, Calabar, Nigeria, with distance costs of links in order of O (n+) tie, where n is the nuber of nodes and is the nuber of links in the network The algorith was presented in the context of wireless packet switch network syste in the University of Calabar, Calabr, Nigeria The ai of the research is to designed a wireless packet switch network in the University of Calabar environent with the objective of deterining the shortest path, dij taken by a essage (packet) to traverse fro a source node (current) to a destination (sink) node considering four different routes in the network syste Index Ters Graph, transit distance (dij) wireless packet switch network adjacency list, adjacency atrix I INTRODUCTION In this research, our network odel is abstracted as a graph G (V, E) In graph theory, the shortest path proble is used to deterine the path between source vertices and destination vertices (or nodes) such that the su of the weights of its constituent edges is iniized A graph G is a collection of two sets V and E where V is the collection of vertices Vo, Vi, --- Vn-1also called nodes and E is the collection of edges e1, e, ----, en where an edge is an arc which connects two nodes (Delling, 8) This can be represented as: G = (V, E) V (G) = (Vo, V1, ----, Vn) or set of vertices E (G) = (e1, e, en) or set of edges In a graph structure, we have two ajor coponents naely: nodes and edges This we need to design the data Ofe O A, Departent of Coputer Science University of Calabar, Nigeria Edi E A, Departent of Coputer Science University of Calabar, Nigeria Ele S I, Departent of Coputer Science University of Calabar, Nigeria structure to keep these coponents in eory There are two ways of representing the graph in coputer eory First one is the sequential representation and second one is the linked list representation Adjacency atrix is the atrix, which keeps the inforation of adjacent nodes In order words we cannot say that this atrix keeps the inforation that whether this node is adjacent to any other node or not If the adjacency atrix of the graph is sparese then it is better to represent the graph through adjacency linked list Our network odel in the University of Calabar is a sparese wireless, undirected packet switch network thus we represent the graph using adjacency priority linked list In this adjacency link list representation of the graph, we will, aintain two lists First list will keep inforation of all nodes in the graph and second list will aintain a list of adjacency nodes for each node There are several cases in graph where we have a need to know the shortest path fro one node to another node In our wireless packet switch network, the switches or routers constitute the nodes, while the distances between any two switches constitute the edges of the network Our proble definition is to find the shortest path (dij) that a packet will take to traverse fro a source node to a destination node Our research scenario is a network routing concept There can be several paths for the packets to go fro one node to another node But the shortest path is that path in which the su of weights of the included edges is the iniu There are several algoriths to deterine or find the shortest path in a network graph Here we describe the odified dikjstra s algorith (Ahn, Raakrishna, Rang & Choi, 1) Fig 1 A wireless packet switch network odeled as a graph structure in the University of Calabar Fro the above graph structure, our objective is to find the shortest path that a packet can traverse fro the source node to the destination node The source node is node 1and the destination node is node 6 We label each node with transit distance or distance cost dij, 194 wwwerpublicationorg

2 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University of Calabar Using a Modified Dijkstra s Algorith predecessor, and status Distance of node represents the shortest distance of that node fro the source node, and predecessor of node represents the node which precedes the given node in the shortest path fro the source Status of a node can be peranent or teporary, aking a node peranent eans that it has been included in the shortest path Teporary nodes can be relabeled if required but once a node is ade peranent it cannot be relabeled The procedure for our odified diskstra s algorith 1 Initially ake source node peranent by assigning to it a distance value of zero and ake it the current working node All other nodes are ade teporary, nodes that are directly reachable fro node 1 have their teporary label equal to dij while nodes that are not reachable fro node 1 have to infinity as their teporary labels Exaine all the teporary neighbours of the current working node and after checking the condition for iniu weight, relabel the required nodes 3 Fro all the teporary nodes, find out the node which has iniu value of distance, ake this node peranent and now this is our current working node 4 When there is a tie in steps and 3 choose any one but exactly once 5 Repeat steps,3 and 4 until destination node is ade peranent Advantages of our odified diskstra s algorith 1 With this algorith, we can iniize our cost while bulding a network This is because the odified dijkstra s will find the shortest path value fro a given source node to the destination node Therefore, we need not build uch of routers to build path fro a node to other With this algorith, we can also axiize the efficiency of the syste, since it will find out the iniu path value Recall that path weight is propagation delay for a syste II PROPOSED WORK There are several cases in graph where we need to know the shortest path fro one node to another node The following doains of application of our algorith follow this approach: Robot path planning, logistic distribution, link-state routing protocol, general electric supply syste, water distribution, railway track syste, driving direction on websites, like ap quest or Google ap, plant and facility layout arising in VLSI design, transportation, and the traveling salesan proble (Anjali, Datta & Joshi, 16) In our wireless packet switch network, our algorith is very useful in the network for routing concepts There are several paths for going fro one node to another node But the shortest path is the path in which the su of weights of the included edges is the iniu There are several algoriths to find out the shortest path Here we will describe the odified dijkstra s algorith We ipleent a total different concept to find out shortest path using the scaled ap of the University of Calabar The ap which we are using is scaled ap which return correct distance between two switches or routers in our network Here we will use link list to store and traverse N nodes or vertices We label each node (switch) with distance predecessor and status Distance of node represents the shortest distance of that node fro the source node, and predecessor of node represents the node which precedes the given node in the shortest path fro the source node, status of a node can be peranent or teporary III RESEARCH DESIGN PROBLEM AND FORMULATION Earlier researchers have perfored various operations on Dijkstra s algorith to deterine the shortest path between the nodes and have got the better results in their researches for the specified nuber of nodes But, the results were liited to the nuber of nodes fixed at the tie while declaring the size of the data structure Anjali, Datta & Joshi, (16) referring to Fuhao ZHANG, introduces the classical dijkstra s algorith in detail, and describes the useful process of ipleentation of the algorith It describes the adjacent node algorith which is a better optiization algorith based on Dijkstra s algorith This algorith akes correlation with each node in the different network topology and inforation, and avoids the use of co-related atrix that contains huge infinite value, and aking it ore reliable and suitable analysis of the networks for ass data () It is prove that this algorith can save a lot of eory space and is ore reliable to the network with huge nodes, but it was found that as node grew larger this approach gets slow in searching nodes In this research, our design proble is to design a wireless network syste in the University of Calabar, Calabar, Nigeria, with the objective of deterining the shortest path fro the source, (current) node to the destination (sink) node in an undirected network syste Thus our odel posses the following attributes: 1 It is a single source shortest path proble in a one-to-all network The edge lengths are non-negative 3 The graph is an undirected one 4 The shortest path is coputed using just coparison and addition odel The attribute of a node in the network are: 1 Its distance value, and Its status label Fro our network design odel in fig 1, the odel of research is designed using the linked list priority queue data structure The siulation is done at different levels of priorities The priority levels are as follows; At level 1: Node 1 Reachable nodes fro node 1 are nodes, 3 and 4 The teporary labels for these nodes are their direct distances fro node 1 to the node in question No teporary label distance is updated here fro upper boundary to a lower boundary (Goldberg, Kaplan, & Werneck, 8) Nodes that cannot be reached directly fro node 1 have as their teporary label In this odel, the researchers used full line for edges that are reachable fro the source nodes and broken lines for edges that cannot be reached directly fro the source 195 wwwerpublicationorg

3 International Journal of Engineering and Technical Research (IJETR) ISSN: (O) (P), Volue-5, Issue-1, May 16 node Thus, the node odel at this level is: At level : Copare the teporary labels of n, n 3 and n4 and ake the sallest of the the current peranent label No teporary label is updated at this stage Thus, if n < n3 and n < n4 then pl = n else pl n : Since 3 < 7 and 3 < 4 n 3 Thus, the logical structure of the odel at level becoes: At level 4: Update teporary label for node 5: TL(5) = in {, 4 + 3} = 7 Copare TLS for n3, n5 and n6 and ake the sallest a peranent label If n3 < n5 and n3 < n 6 then pl = n3 Else pl n3 since 5 < 7 and 5 < 1 n 3 5 Thus, the logical structure of the odel at level 3 becoes: At level 3: Update the teporary labels for the nodes that are directly reachable fro node ; copare their TLs and ake the sallest TL a peranent label The new TL for node 3 = in {, 3 + } = 5 in {, + 7} = 7 : new TL for node 3 = 5 and new TL for node 6 = in {, 3 + 9} = 1 now copare the TLs and ake the sallest of the a peranent label If n3 < n4 and n3 < n6 then pl = n3 otherwise pl n3 : Since the IF stateent = False Another coparison was tested with n4 IF n4 < n3 and n4 < n6 then pl = n4 Else pl n4 Since 4 < 5 and 4 < 1 then At level 5: Update teporary label for node 5 and 6 n5: in{, 5 + 3} = 8 in {, 4 + 3} = 7 TL for n5 = 7 n6: in {, 3 + 9} = 1 in {, 5 + 6} = 11 TL for n6 = 11 Now copare TLS for node 5 and 6 and ake the sallest a pl IF n5 < n 6 then n 5 7 Thus, the logical structure of the odel at level 5 becoes: n 4 4 Thus, the logical structure of the odel at level 3 becoes: 196 wwwerpublicationorg

4 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University of Calabar Using a Modified Dijkstra s Algorith At level 6: Node 6 is the last node to be visited Update the teporary label of node 6 and ake it peranent n6: in {, 5 + 6} = 11 in {, 7 + 3} = n1 1 n 3 13 n3 1n n nn It is required to represent G in a coputer eory with an adjacency atrix of size N<n Solution Consider a graph G having n = 6 nodes or vertices as shown Thus, node 6 has a new TL of 1 and it is autoatically ade peranent The algorith converges at this point The shortest path dij of the network ode is 1 and the path length or link whose dij = 1 is the shortest path of the network Fro the logical siulation of the wireless packet switch network odel in the University of Calabar, the shortest path for the packets to traverse fro the source node to the destination is as follows: n 1 n 4 n 5 n n 1 n 4 n 5 n 6 IF TL1 < TL < < T < K Then pl = TL1 otherwise pl TL1 subject to further coparison and selection IV RESEARCH FORMULATION To resolve this proble and to give the best solution for increasing nuber of nodes we used the priority queue link list having the capacity to store N nodes with soe constraints containing the value predecessor, status and distance (Kiran & Ranjit, 1) Proble: Given a graph G = {V, E} where V is the set of nodes (or vertices) in G and E the set of edges in G, if n = V is the nuber of vertices in G, then the size of the adjacency atrix required to store G in a coputer eory is n x n (or n): G requires a 6 x 6 (or 36) adjacency atrix to represent it in a coputer eory This representation is shown below Notice that this adjacency atrix is a syetric atrix that is MT = M thus, ij = ij ij {1,,3,4,5,6} and wij = i =j Hence, if all duplicate is reove, starting fro i = j downward, as follows; Thus, the size of this new atrix is the su of each row given as = 15 In general, n n - + n n - (n - 1) = n (n - 1) Hence, the size of atrix N is N = n (n - 1) Where n = nuber of nodes Clearly N < n in fact 197 wwwerpublicationorg

5 Theore: N is less than 5% of n that is, N < 5% n Proof: Suppose N = X% n, then N(n 1) = xn 1, n n = xn 1 ==> 1 (n n) = xn ==> x = 5(n - n) = 5 n(n 1) n n ==> 5 5 = x (1) n Since x depends on n, we can take liit as n : li x (n) = 5 and hence, the proof: n eg in the above atrix, n = 6, thus, x (6) = 5 5/6 = x(6) = 4167% ==> 15 is 4167% of 36 Therefore, percentage reduction = = 5833% Instead of creating a ultidiensional array M for storing the graph G, we can rearrange the reaining eleents of the atrix M as follow; Observe that each eleent have been isolated with a faint line while each row separated by thick line as shown above But atrix M is a -D array ij, hence, we need to provide an interface for this new one diensional array so as to ake it appear ulti-diensional Row R and Colun Cij -Diensional array is divided into rows and coluns In the case of atrix ij, i = row and j = colun nubers Hence, we need to find a forula R for the row and Cij for the colun C r 1= 1 1 st row begins at eleent 3 r = n 1 +1 nd row begins at eleent => r 3 = n 1 + n +1 3 rd row beings at eleent 1 => r 4 = n 1 + n + n th row begins at eleent 3 => r = n-1+n-+n-3+ +n-(-1)+1 r = ( 1) n - ( 1) International Journal of Engineering and Technical Research (IJETR) ISSN: (O) (P), Volue-5, Issue-1, May 16 n ( -1) ( 1) + Thus, r = ( 1)(n ) + 1 () Equation () is the required forular for the row nuber If = I, we have r i = (i 1)(n i) + 1 V COLUMN Given a pair of vertices i, j, where i<j, then the colun where the weight of the graph G is stored is given by Cij = j i 1 (3) i<j Therefore, given two vertices (or nodes) i and j, the edge fro i to j or j to i is given by Aij = ri + Cij (4) Equation (4) is the forular that turns A (a single diension array) into Aij (a ultidiensional array) Proof: We ust show that Mij = Aji ij {1,,3,4,5,6} M1 = 3, A1 = r1 + C1 ((1 1)((6) 1))/ ( 1 1) A1 = = 1 check the index 1 in A M35 = 3, A35 = r3 + C35 ((3 1)((6) 1))/ (5 3 1) A35 = = 13 check the index 3 in A VI CONCLUSION Our odified Dijkstra s algorith is an iproved version of the traditional Dijkstra s algorith Currently, our algorith used priority queue with link list with soe constraints, plus one odified Dijkstra call This odified Dijkstra s algorith should iprove the running tie of our algorith by about 5833% and the shortest path link is node 1 node 4 nodes 5 node 6 where node 1 is the source (current) node while node 6 is the destination (sink) node in our wireless packet switch network syste in the University of Calabar, Calabar, Nigeria REFERENCES [1] Anjali, J, Datta, U and Joshi, K K (16) Modification in Dijkstra s Algorith to Find the Shortest Path for N Nodes with Constraint International Journal of Scientific Engineering and Applied Science, (1) [] Ahn, C W, Raakrishna, R S, Rang, C G & Choi, I C (1) Shortest path routing algorith using hopfield neural network, Electron Lett, 37(19): [3] Delling, D & Nannicini, G (8) Bidirectional Core-Based Routing in Dynaic Tie-Dependent Road Networks In S-H Hong, H Nagaochi, and T Fukunaga, editors, Proceedings of the 19th International Syposiuon Algoriths and Coputation (ISAAC 8), volue 5369 of Lecture Notes in Coputer Science, pp [4] Delling, D (8) Tie-Dependent SHARC-Routing In Proceedings of the 16th Annual European Syposiuon Algoriths (ESA 8), volue 5193 of Lecture Notes in Coputer Science, pp [5] Goldberg, A V Kaplan, H & Werneck, R F (8) Reach for A*: Shortest Path Algoriths with Preprocessing In C Deetrescu, A V Goldberg, and D S Johnson, editors, Shortest Paths: Ninth DIMACS Ipleentation Challenge, DIMACS Book Aerican Matheatical Society [6] [7] Kiran, Y & Ranjit B, (1) An Approach to Find Kth Shortest Path using Fuzzy Logic International Journal of Coputational Cognition, 8(1) 198 wwwerpublicationorg

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

Reconstruction of Time Series using Optimal Ordering of ICA Components

Reconstruction of Time Series using Optimal Ordering of ICA Components Reconstruction of Tie Series using Optial Ordering of ICA Coponents Ar Goneid and Abear Kael Departent of Coputer Science & Engineering, The Aerican University in Cairo, Cairo, Egypt e-ail: goneid@aucegypt.edu

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

Gromov-Hausdorff Distance Between Metric Graphs

Gromov-Hausdorff Distance Between Metric Graphs Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

Relief shape inheritance and graphical editor for the landscape design

Relief shape inheritance and graphical editor for the landscape design Relief shape inheritance and graphical editor for the landscape design Egor A. Yusov Vadi E. Turlapov Nizhny Novgorod State University after N. I. Lobachevsky Nizhny Novgorod Russia yusov_egor@ail.ru vadi.turlapov@cs.vk.unn.ru

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Automatic Graph Drawing Algorithms

Automatic Graph Drawing Algorithms Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs

More information

A simplified approach to merging partial plane images

A simplified approach to merging partial plane images A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI

More information

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

LOSSLESS COMPRESSION OF BAYER MASK IMAGES USING AN OPTIMAL VECTOR PREDICTION TECHNIQUE

LOSSLESS COMPRESSION OF BAYER MASK IMAGES USING AN OPTIMAL VECTOR PREDICTION TECHNIQUE 1th European Signal Processing Conference (EUSIPCO 2006), Florence, Italy, Septeber -8, 2006, copyright by EUASIP LOSSLESS COMPESSION OF AYE MASK IMAES USIN AN OPTIMAL VECTO PEDICTION TECHNIQUE Stefano

More information

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,

More information

Problem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm

Problem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm Proble Solving of graph correspondence using Genetics Algorith and ACO Algorith Alireza Rezaee, 1, Azizeh Ajalli 2 Assistant professor,departent of Mechatronics Engineering, Faculty of New Sciences and

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS

OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS ADRIAN DEACONU Transilvania University of Brasov, Roania Abstract A linear tie

More information

Distributed Multicast Tree Construction in Wireless Sensor Networks

Distributed Multicast Tree Construction in Wireless Sensor Networks Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,

More information

P NP. Approximation Algorithms. Computational hardness. Vertex cover. Vertex cover. Vertex cover. Plan: Vertex Cover Metric TSP 3SAT

P NP. Approximation Algorithms. Computational hardness. Vertex cover. Vertex cover. Vertex cover. Plan: Vertex Cover Metric TSP 3SAT Great Theoretical Ideas In Coputer Science Victor Adachi CS - Carnegie Mellon University Approxiation Algoriths P NP Plan: Vertex Cover 3SAT Coputational hardness Suppose we are given an NP-coplete proble

More information

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The

More information

COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT

COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT B.BOOBA 1 Dr. T.V.GOPAL 2 1 Research Scholar, Assist. Professor(Sl.Gr),Departent of Coputer Applications, Easwari

More information

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage 216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent

More information

Lecture 18 Solving Shortest Path Problem: Dijkstra s Algorithm. October 23, 2009

Lecture 18 Solving Shortest Path Problem: Dijkstra s Algorithm. October 23, 2009 Solving Shortest Path Problem: Dijkstra s Algorithm October 23, 2009 Outline Lecture 18 Focus on Dijkstra s Algorithm Importance: Where it has been used? Algorithm s general description Algorithm steps

More information

Multipath Selection and Channel Assignment in Wireless Mesh Networks

Multipath Selection and Channel Assignment in Wireless Mesh Networks Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

A Hybrid Network Architecture for File Transfers

A Hybrid Network Architecture for File Transfers JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,

More information

Closing The Performance Gap between Causal Consistency and Eventual Consistency

Closing The Performance Gap between Causal Consistency and Eventual Consistency Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

1 P a g e. F x,x...,x,.,.' written as F D, is the same.

1 P a g e. F x,x...,x,.,.' written as F D, is the same. 11. The security syste at an IT office is coposed of 10 coputers of which exactly four are working. To check whether the syste is functional, the officials inspect four of the coputers picked at rando

More information

Distributed Multi-robot Work Load Partition In Manufacturing Automation

Distributed Multi-robot Work Load Partition In Manufacturing Automation th IEEE Conference on Autoation Science and Engineering Key Bridge Marriott, Washington DC, USA August 3-, Distributed Multi-robot Work Load Partition In Manufacturing Autoation Gira S Tewolde, Changhua

More information

A Study of the Relationship Between Support Vector Machine and Gabriel Graph

A Study of the Relationship Between Support Vector Machine and Gabriel Graph A Study of the Relationship Between Support Vector Machine and Gabriel Graph Wan Zhang and Irwin King {wzhang, king}@cse.cuhk.edu.hk Departent of Coputer Science & Engineering The Chinese University of

More information

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

Real-Time Detection of Invisible Spreaders

Real-Time Detection of Invisible Spreaders Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

λ-harmonious Graph Colouring Lauren DeDieu

λ-harmonious Graph Colouring Lauren DeDieu λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex

More information

Meta-heuristic Approaches for the Assembly Line Balancing Problem

Meta-heuristic Approaches for the Assembly Line Balancing Problem Proceedings of the 202 International Conference on Industrial Engineering and Operations Manageent Istanbul, Turey, July 3 6, 202 Meta-heuristic Approaches for the Assebly Line Balancing Proble Adil Bayasoğlu

More information

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan

More information

On the Computation and Application of Prototype Point Patterns

On the Computation and Application of Prototype Point Patterns On the Coputation and Application of Prototype Point Patterns Katherine E. Tranbarger Freier 1 and Frederic Paik Schoenberg 2 Abstract This work addresses coputational probles related to the ipleentation

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India

More information

2 P. S. BRADLEY & O. L. MANGASARIAN 2. The k-plane Clustering (kpc) Algorith We consider a set A of points in the n-diensional real space R n represen

2 P. S. BRADLEY & O. L. MANGASARIAN 2. The k-plane Clustering (kpc) Algorith We consider a set A of points in the n-diensional real space R n represen Journal of Global Optiization,, {9 (999) c 999 Kluwer Acadeic Publishers, Boston. Manufactured in The Netherlands. k-plane Clustering P. S. BRADLEY & O. L. MANGASARIAN bradley@icrosoft.co, olvi@cs.wisc.edu

More information

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math Sarter Balanced Assessent Consortiu s, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

Design and Implementation of an Acyclic Stable Matching Scheduler

Design and Implementation of an Acyclic Stable Matching Scheduler Design and Ipleentation of an Acyclic Stable Matching Scheduler Enyue Lu Mei Yang Yi Zhang ands.q.zheng Dept. of Coputer Science Dept. of Coputer Science Dept. of Electrical Engineering University of Texas

More information

Deterministic Voting in Distributed Systems Using Error-Correcting Codes

Deterministic Voting in Distributed Systems Using Error-Correcting Codes IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract

More information

MIDA: AN IDA SEARCH WITH DYNAMIC CONTROL

MIDA: AN IDA SEARCH WITH DYNAMIC CONTROL April 1991 UILU-ENG-91-2216 CRHC-91-9 Center fo r Reliable and High-Perforance Coputing MIDA: AN IDA SEARCH WITH DYNAMIC CONTROL Benjain W. Wah Coordinated Science Laboratory College of Engineering UNIVERSITY

More information

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13

Computer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13 Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical

More information

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant

More information

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang

POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Recursion-Driven Parallel Code Generation for Multi-Core Platforms

Recursion-Driven Parallel Code Generation for Multi-Core Platforms Recursion-Driven Parallel Generation for Multi- Platfors Rebecca L. Collins, Bharadwaj Vellore, and Luca P. Carloni Departent of Coputer Science, Colubia University, New York, NY 10027 Eail: {rlc2119,vrb2102,luca}@cs.colubia.edu

More information

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

News Events Clustering Method Based on Staging Incremental Single-Pass Technique

News Events Clustering Method Based on Staging Incremental Single-Pass Technique News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2

More information

Collection Selection Based on Historical Performance for Efficient Processing

Collection Selection Based on Historical Performance for Efficient Processing Collection Selection Based on Historical Perforance for Efficient Processing Christopher T. Fallen and Gregory B. Newby Arctic Region Supercoputing Center University of Alaska Fairbanks Fairbanks, Alaska

More information

The Internal Conflict of a Belief Function

The Internal Conflict of a Belief Function The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of

More information

The Boundary Between Privacy and Utility in Data Publishing

The Boundary Between Privacy and Utility in Data Publishing The Boundary Between Privacy and Utility in Data Publishing Vibhor Rastogi Dan Suciu Sungho Hong ABSTRACT We consider the privacy proble in data publishing: given a database instance containing sensitive

More information

Galois Homomorphic Fractal Approach for the Recognition of Emotion

Galois Homomorphic Fractal Approach for the Recognition of Emotion Galois Hooorphic Fractal Approach for the Recognition of Eotion T. G. Grace Elizabeth Rani 1, G. Jayalalitha 1 Research Scholar, Bharathiar University, India, Associate Professor, Departent of Matheatics,

More information

Fair Resource Allocation for Heterogeneous Tasks

Fair Resource Allocation for Heterogeneous Tasks Fair Resource Allocation for Heterogeneous Tasks Koyel Mukherjee, Partha utta, Gurulingesh Raravi, Thangaraj Balasubraania, Koustuv asgupta, Atul Singh Xerox Research Center India, Bangalore, India 560105

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S COPUTER GEERATED HOLOGRAS Optical Sciences 67 W.J. Dallas (onday, August 3, 004, 1:38 P) PART III: CHAPTER OE DIFFUSERS FOR CGH S Part III: Chapter One Page 1 of 8 Introduction Hologras for display purposes

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networs F. Mousavi Madani Departent of coputer engineering Alzahra University Tehran, Iran, osavif@alzahra.ac.ir Received:

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Medical Biophysics 302E/335G/ st1-07 page 1

Medical Biophysics 302E/335G/ st1-07 page 1 Medical Biophysics 302E/335G/500 20070109 st1-07 page 1 STEREOLOGICAL METHODS - CONCEPTS Upon copletion of this lesson, the student should be able to: -define the ter stereology -distinguish between quantitative

More information

CHANGE DETECTION OF REMOTE SENSING IMAGES BY DT-CWT AND MRF

CHANGE DETECTION OF REMOTE SENSING IMAGES BY DT-CWT AND MRF ISPRS Hannover Workshop: HRIGI 17 CMRT 17 ISA 17 EuroCOW 17, 6 9 June 2017, Hannover, Gerany CHANGE DETECTION OF REMOTE SENSING IMAGES BY DT-CWT AND MRF Shida OuYang a, Kuikui Fan a,b, Huibing Wang a,

More information

3 Conference on Inforation Sciences and Systes, The Johns Hopkins University, March, 3 Sensitivity Characteristics of Cross-Correlation Distance Metric and Model Function F. Porikli Mitsubishi Electric

More information

An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints

An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints 519 An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured fro Different Viewpoints Yousuke Kawauchi 1, Shin Usuki, Kenjiro T. Miura 3, Hiroshi Masuda 4 and Ichiro Tanaka 5 1 Shizuoka

More information

A Model Free Automatic Tuning Method for a Restricted Structured Controller. by using Simultaneous Perturbation Stochastic Approximation

A Model Free Automatic Tuning Method for a Restricted Structured Controller. by using Simultaneous Perturbation Stochastic Approximation 28 Aerican Control Conference Westin Seattle Hotel, Seattle, Washington, USA June -3, 28 WeC9.5 A Model Free Autoatic Tuning Method for a Restricted Structured Controller by Using Siultaneous Perturbation

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

arxiv: v1 [cs.dc] 3 Oct 2018

arxiv: v1 [cs.dc] 3 Oct 2018 Sparse Winograd Convolutional neural networks on sall-scale systolic arrays Feng Shi, Haochen Li, Yuhe Gao, Benjain Kuschner, Song-Chun Zhu University of California Los Angeles Los Angeles, USA {shi.feng,sczh}@cs.ucla.edu

More information

Data Caching for Enhancing Anonymity

Data Caching for Enhancing Anonymity Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu

More information

Threshold Analysis of Non-Binary Spatially-Coupled LDPC Codes with Windowed Decoding

Threshold Analysis of Non-Binary Spatially-Coupled LDPC Codes with Windowed Decoding 1 Threshold Analysis of Non-Binary Spatially-Coupled LDPC Codes with Windowed Decoding Lai Wei, Toshiaki Koike-Akino, David G. M. Mitchell, Thoas E. Fuja, and Daniel J. Costello, Jr. Departent of Electrical

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao

More information

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem IE Vol. 7, No. 2, pp. 84-92, Septeber 2008. A Coparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Proble Ji Ung Sun School of Industrial and Managent Engineering Hankuk University

More information

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,

More information

Regular and Irreguar m-polar Fuzzy Graphs

Regular and Irreguar m-polar Fuzzy Graphs Global Journal of Matheatical Sciences: Theory and Practical. ISSN 0974-300 Volue 9, Nuber 07, pp. 39-5 International Research Publication House http://www.irphouse.co Regular and Irreguar -polar Fuzzy

More information

An Optimization Clustering Algorithm Based on Texture Feature Fusion for Color Image Segmentation

An Optimization Clustering Algorithm Based on Texture Feature Fusion for Color Image Segmentation Algoriths 2015, 8, 234-247; doi:10.3390/a8020234 Article OPEN ACCESS algoriths ISSN 1999-4893 www.dpi.co/journal/algoriths An Optiization Clustering Algorith Based on Texture Feature Fusion for Color Iage

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

Rule Extraction using Artificial Neural Networks

Rule Extraction using Artificial Neural Networks Rule Extraction using Artificial Neural Networks S. M. Karuzzaan 1 Ahed Ryadh Hasan 2 Abstract Artificial neural networks have been successfully applied to a variety of business application probles involving

More information

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization

More information