Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm
|
|
- Delphia Price
- 6 years ago
- Views:
Transcription
1 International Journal of Engineering and Technical Research (IJETR) ISSN: (O) (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University of Calabar Using a Modified Dijkstra s Algorith Ofe O A, Edi E A, Ele S I, Abstract The proble of finding the shortest path between two odes is a well known proble in network analysis Optial routing has been widely studied for interconnection network This research considers the proble of finding the shortest path in a wireless packet switch network syste in the University of Calabar environent, Calabar, Nigeria Its theoretical approach, ipleentation and application First a historical background of sp algorith was given and basic concepts of network analysis in connection with congestion and delay issues were explored for the later use The report was concentrated on the odified Dijkstra s algorith and the open shortest path first (OSPF) algorith, use in finding single source shortest path in a one-to-all undirected wireless packet switch network syste in the University of Calabar environent, Calabar, Nigeria, with distance costs of links in order of O (n+) tie, where n is the nuber of nodes and is the nuber of links in the network The algorith was presented in the context of wireless packet switch network syste in the University of Calabar, Calabr, Nigeria The ai of the research is to designed a wireless packet switch network in the University of Calabar environent with the objective of deterining the shortest path, dij taken by a essage (packet) to traverse fro a source node (current) to a destination (sink) node considering four different routes in the network syste Index Ters Graph, transit distance (dij) wireless packet switch network adjacency list, adjacency atrix I INTRODUCTION In this research, our network odel is abstracted as a graph G (V, E) In graph theory, the shortest path proble is used to deterine the path between source vertices and destination vertices (or nodes) such that the su of the weights of its constituent edges is iniized A graph G is a collection of two sets V and E where V is the collection of vertices Vo, Vi, --- Vn-1also called nodes and E is the collection of edges e1, e, ----, en where an edge is an arc which connects two nodes (Delling, 8) This can be represented as: G = (V, E) V (G) = (Vo, V1, ----, Vn) or set of vertices E (G) = (e1, e, en) or set of edges In a graph structure, we have two ajor coponents naely: nodes and edges This we need to design the data Ofe O A, Departent of Coputer Science University of Calabar, Nigeria Edi E A, Departent of Coputer Science University of Calabar, Nigeria Ele S I, Departent of Coputer Science University of Calabar, Nigeria structure to keep these coponents in eory There are two ways of representing the graph in coputer eory First one is the sequential representation and second one is the linked list representation Adjacency atrix is the atrix, which keeps the inforation of adjacent nodes In order words we cannot say that this atrix keeps the inforation that whether this node is adjacent to any other node or not If the adjacency atrix of the graph is sparese then it is better to represent the graph through adjacency linked list Our network odel in the University of Calabar is a sparese wireless, undirected packet switch network thus we represent the graph using adjacency priority linked list In this adjacency link list representation of the graph, we will, aintain two lists First list will keep inforation of all nodes in the graph and second list will aintain a list of adjacency nodes for each node There are several cases in graph where we have a need to know the shortest path fro one node to another node In our wireless packet switch network, the switches or routers constitute the nodes, while the distances between any two switches constitute the edges of the network Our proble definition is to find the shortest path (dij) that a packet will take to traverse fro a source node to a destination node Our research scenario is a network routing concept There can be several paths for the packets to go fro one node to another node But the shortest path is that path in which the su of weights of the included edges is the iniu There are several algoriths to deterine or find the shortest path in a network graph Here we describe the odified dikjstra s algorith (Ahn, Raakrishna, Rang & Choi, 1) Fig 1 A wireless packet switch network odeled as a graph structure in the University of Calabar Fro the above graph structure, our objective is to find the shortest path that a packet can traverse fro the source node to the destination node The source node is node 1and the destination node is node 6 We label each node with transit distance or distance cost dij, 194 wwwerpublicationorg
2 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University of Calabar Using a Modified Dijkstra s Algorith predecessor, and status Distance of node represents the shortest distance of that node fro the source node, and predecessor of node represents the node which precedes the given node in the shortest path fro the source Status of a node can be peranent or teporary, aking a node peranent eans that it has been included in the shortest path Teporary nodes can be relabeled if required but once a node is ade peranent it cannot be relabeled The procedure for our odified diskstra s algorith 1 Initially ake source node peranent by assigning to it a distance value of zero and ake it the current working node All other nodes are ade teporary, nodes that are directly reachable fro node 1 have their teporary label equal to dij while nodes that are not reachable fro node 1 have to infinity as their teporary labels Exaine all the teporary neighbours of the current working node and after checking the condition for iniu weight, relabel the required nodes 3 Fro all the teporary nodes, find out the node which has iniu value of distance, ake this node peranent and now this is our current working node 4 When there is a tie in steps and 3 choose any one but exactly once 5 Repeat steps,3 and 4 until destination node is ade peranent Advantages of our odified diskstra s algorith 1 With this algorith, we can iniize our cost while bulding a network This is because the odified dijkstra s will find the shortest path value fro a given source node to the destination node Therefore, we need not build uch of routers to build path fro a node to other With this algorith, we can also axiize the efficiency of the syste, since it will find out the iniu path value Recall that path weight is propagation delay for a syste II PROPOSED WORK There are several cases in graph where we need to know the shortest path fro one node to another node The following doains of application of our algorith follow this approach: Robot path planning, logistic distribution, link-state routing protocol, general electric supply syste, water distribution, railway track syste, driving direction on websites, like ap quest or Google ap, plant and facility layout arising in VLSI design, transportation, and the traveling salesan proble (Anjali, Datta & Joshi, 16) In our wireless packet switch network, our algorith is very useful in the network for routing concepts There are several paths for going fro one node to another node But the shortest path is the path in which the su of weights of the included edges is the iniu There are several algoriths to find out the shortest path Here we will describe the odified dijkstra s algorith We ipleent a total different concept to find out shortest path using the scaled ap of the University of Calabar The ap which we are using is scaled ap which return correct distance between two switches or routers in our network Here we will use link list to store and traverse N nodes or vertices We label each node (switch) with distance predecessor and status Distance of node represents the shortest distance of that node fro the source node, and predecessor of node represents the node which precedes the given node in the shortest path fro the source node, status of a node can be peranent or teporary III RESEARCH DESIGN PROBLEM AND FORMULATION Earlier researchers have perfored various operations on Dijkstra s algorith to deterine the shortest path between the nodes and have got the better results in their researches for the specified nuber of nodes But, the results were liited to the nuber of nodes fixed at the tie while declaring the size of the data structure Anjali, Datta & Joshi, (16) referring to Fuhao ZHANG, introduces the classical dijkstra s algorith in detail, and describes the useful process of ipleentation of the algorith It describes the adjacent node algorith which is a better optiization algorith based on Dijkstra s algorith This algorith akes correlation with each node in the different network topology and inforation, and avoids the use of co-related atrix that contains huge infinite value, and aking it ore reliable and suitable analysis of the networks for ass data () It is prove that this algorith can save a lot of eory space and is ore reliable to the network with huge nodes, but it was found that as node grew larger this approach gets slow in searching nodes In this research, our design proble is to design a wireless network syste in the University of Calabar, Calabar, Nigeria, with the objective of deterining the shortest path fro the source, (current) node to the destination (sink) node in an undirected network syste Thus our odel posses the following attributes: 1 It is a single source shortest path proble in a one-to-all network The edge lengths are non-negative 3 The graph is an undirected one 4 The shortest path is coputed using just coparison and addition odel The attribute of a node in the network are: 1 Its distance value, and Its status label Fro our network design odel in fig 1, the odel of research is designed using the linked list priority queue data structure The siulation is done at different levels of priorities The priority levels are as follows; At level 1: Node 1 Reachable nodes fro node 1 are nodes, 3 and 4 The teporary labels for these nodes are their direct distances fro node 1 to the node in question No teporary label distance is updated here fro upper boundary to a lower boundary (Goldberg, Kaplan, & Werneck, 8) Nodes that cannot be reached directly fro node 1 have as their teporary label In this odel, the researchers used full line for edges that are reachable fro the source nodes and broken lines for edges that cannot be reached directly fro the source 195 wwwerpublicationorg
3 International Journal of Engineering and Technical Research (IJETR) ISSN: (O) (P), Volue-5, Issue-1, May 16 node Thus, the node odel at this level is: At level : Copare the teporary labels of n, n 3 and n4 and ake the sallest of the the current peranent label No teporary label is updated at this stage Thus, if n < n3 and n < n4 then pl = n else pl n : Since 3 < 7 and 3 < 4 n 3 Thus, the logical structure of the odel at level becoes: At level 4: Update teporary label for node 5: TL(5) = in {, 4 + 3} = 7 Copare TLS for n3, n5 and n6 and ake the sallest a peranent label If n3 < n5 and n3 < n 6 then pl = n3 Else pl n3 since 5 < 7 and 5 < 1 n 3 5 Thus, the logical structure of the odel at level 3 becoes: At level 3: Update the teporary labels for the nodes that are directly reachable fro node ; copare their TLs and ake the sallest TL a peranent label The new TL for node 3 = in {, 3 + } = 5 in {, + 7} = 7 : new TL for node 3 = 5 and new TL for node 6 = in {, 3 + 9} = 1 now copare the TLs and ake the sallest of the a peranent label If n3 < n4 and n3 < n6 then pl = n3 otherwise pl n3 : Since the IF stateent = False Another coparison was tested with n4 IF n4 < n3 and n4 < n6 then pl = n4 Else pl n4 Since 4 < 5 and 4 < 1 then At level 5: Update teporary label for node 5 and 6 n5: in{, 5 + 3} = 8 in {, 4 + 3} = 7 TL for n5 = 7 n6: in {, 3 + 9} = 1 in {, 5 + 6} = 11 TL for n6 = 11 Now copare TLS for node 5 and 6 and ake the sallest a pl IF n5 < n 6 then n 5 7 Thus, the logical structure of the odel at level 5 becoes: n 4 4 Thus, the logical structure of the odel at level 3 becoes: 196 wwwerpublicationorg
4 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University of Calabar Using a Modified Dijkstra s Algorith At level 6: Node 6 is the last node to be visited Update the teporary label of node 6 and ake it peranent n6: in {, 5 + 6} = 11 in {, 7 + 3} = n1 1 n 3 13 n3 1n n nn It is required to represent G in a coputer eory with an adjacency atrix of size N<n Solution Consider a graph G having n = 6 nodes or vertices as shown Thus, node 6 has a new TL of 1 and it is autoatically ade peranent The algorith converges at this point The shortest path dij of the network ode is 1 and the path length or link whose dij = 1 is the shortest path of the network Fro the logical siulation of the wireless packet switch network odel in the University of Calabar, the shortest path for the packets to traverse fro the source node to the destination is as follows: n 1 n 4 n 5 n n 1 n 4 n 5 n 6 IF TL1 < TL < < T < K Then pl = TL1 otherwise pl TL1 subject to further coparison and selection IV RESEARCH FORMULATION To resolve this proble and to give the best solution for increasing nuber of nodes we used the priority queue link list having the capacity to store N nodes with soe constraints containing the value predecessor, status and distance (Kiran & Ranjit, 1) Proble: Given a graph G = {V, E} where V is the set of nodes (or vertices) in G and E the set of edges in G, if n = V is the nuber of vertices in G, then the size of the adjacency atrix required to store G in a coputer eory is n x n (or n): G requires a 6 x 6 (or 36) adjacency atrix to represent it in a coputer eory This representation is shown below Notice that this adjacency atrix is a syetric atrix that is MT = M thus, ij = ij ij {1,,3,4,5,6} and wij = i =j Hence, if all duplicate is reove, starting fro i = j downward, as follows; Thus, the size of this new atrix is the su of each row given as = 15 In general, n n - + n n - (n - 1) = n (n - 1) Hence, the size of atrix N is N = n (n - 1) Where n = nuber of nodes Clearly N < n in fact 197 wwwerpublicationorg
5 Theore: N is less than 5% of n that is, N < 5% n Proof: Suppose N = X% n, then N(n 1) = xn 1, n n = xn 1 ==> 1 (n n) = xn ==> x = 5(n - n) = 5 n(n 1) n n ==> 5 5 = x (1) n Since x depends on n, we can take liit as n : li x (n) = 5 and hence, the proof: n eg in the above atrix, n = 6, thus, x (6) = 5 5/6 = x(6) = 4167% ==> 15 is 4167% of 36 Therefore, percentage reduction = = 5833% Instead of creating a ultidiensional array M for storing the graph G, we can rearrange the reaining eleents of the atrix M as follow; Observe that each eleent have been isolated with a faint line while each row separated by thick line as shown above But atrix M is a -D array ij, hence, we need to provide an interface for this new one diensional array so as to ake it appear ulti-diensional Row R and Colun Cij -Diensional array is divided into rows and coluns In the case of atrix ij, i = row and j = colun nubers Hence, we need to find a forula R for the row and Cij for the colun C r 1= 1 1 st row begins at eleent 3 r = n 1 +1 nd row begins at eleent => r 3 = n 1 + n +1 3 rd row beings at eleent 1 => r 4 = n 1 + n + n th row begins at eleent 3 => r = n-1+n-+n-3+ +n-(-1)+1 r = ( 1) n - ( 1) International Journal of Engineering and Technical Research (IJETR) ISSN: (O) (P), Volue-5, Issue-1, May 16 n ( -1) ( 1) + Thus, r = ( 1)(n ) + 1 () Equation () is the required forular for the row nuber If = I, we have r i = (i 1)(n i) + 1 V COLUMN Given a pair of vertices i, j, where i<j, then the colun where the weight of the graph G is stored is given by Cij = j i 1 (3) i<j Therefore, given two vertices (or nodes) i and j, the edge fro i to j or j to i is given by Aij = ri + Cij (4) Equation (4) is the forular that turns A (a single diension array) into Aij (a ultidiensional array) Proof: We ust show that Mij = Aji ij {1,,3,4,5,6} M1 = 3, A1 = r1 + C1 ((1 1)((6) 1))/ ( 1 1) A1 = = 1 check the index 1 in A M35 = 3, A35 = r3 + C35 ((3 1)((6) 1))/ (5 3 1) A35 = = 13 check the index 3 in A VI CONCLUSION Our odified Dijkstra s algorith is an iproved version of the traditional Dijkstra s algorith Currently, our algorith used priority queue with link list with soe constraints, plus one odified Dijkstra call This odified Dijkstra s algorith should iprove the running tie of our algorith by about 5833% and the shortest path link is node 1 node 4 nodes 5 node 6 where node 1 is the source (current) node while node 6 is the destination (sink) node in our wireless packet switch network syste in the University of Calabar, Calabar, Nigeria REFERENCES [1] Anjali, J, Datta, U and Joshi, K K (16) Modification in Dijkstra s Algorith to Find the Shortest Path for N Nodes with Constraint International Journal of Scientific Engineering and Applied Science, (1) [] Ahn, C W, Raakrishna, R S, Rang, C G & Choi, I C (1) Shortest path routing algorith using hopfield neural network, Electron Lett, 37(19): [3] Delling, D & Nannicini, G (8) Bidirectional Core-Based Routing in Dynaic Tie-Dependent Road Networks In S-H Hong, H Nagaochi, and T Fukunaga, editors, Proceedings of the 19th International Syposiuon Algoriths and Coputation (ISAAC 8), volue 5369 of Lecture Notes in Coputer Science, pp [4] Delling, D (8) Tie-Dependent SHARC-Routing In Proceedings of the 16th Annual European Syposiuon Algoriths (ESA 8), volue 5193 of Lecture Notes in Coputer Science, pp [5] Goldberg, A V Kaplan, H & Werneck, R F (8) Reach for A*: Shortest Path Algoriths with Preprocessing In C Deetrescu, A V Goldberg, and D S Johnson, editors, Shortest Paths: Ninth DIMACS Ipleentation Challenge, DIMACS Book Aerican Matheatical Society [6] [7] Kiran, Y & Ranjit B, (1) An Approach to Find Kth Shortest Path using Fuzzy Logic International Journal of Coputational Cognition, 8(1) 198 wwwerpublicationorg
The optimization design of microphone array layout for wideband noise sources
PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun
More informationTensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3
2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition
More informationReconstruction of Time Series using Optimal Ordering of ICA Components
Reconstruction of Tie Series using Optial Ordering of ICA Coponents Ar Goneid and Abear Kael Departent of Coputer Science & Engineering, The Aerican University in Cairo, Cairo, Egypt e-ail: goneid@aucegypt.edu
More informationIntegrating fast mobility in the OLSR routing protocol
Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr
More informationGromov-Hausdorff Distance Between Metric Graphs
Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value
More informationStructural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.
Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable
More informationEE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011
EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction
More informationOblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands
Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu
More informationA Novel Fast Constructive Algorithm for Neural Classifier
A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore
More informationRelief shape inheritance and graphical editor for the landscape design
Relief shape inheritance and graphical editor for the landscape design Egor A. Yusov Vadi E. Turlapov Nizhny Novgorod State University after N. I. Lobachevsky Nizhny Novgorod Russia yusov_egor@ail.ru vadi.turlapov@cs.vk.unn.ru
More informationDifferent criteria of dynamic routing
Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich
More informationSolving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification
Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural
More informationAn Efficient Approach for Content Delivery in Overlay Networks
An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr
More informationAutomatic Graph Drawing Algorithms
Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs
More informationA simplified approach to merging partial plane images
A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D
More informationSurvivability Function A Measure of Disaster-Based Routing Performance
Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected
More informationGeo-activity Recommendations by using Improved Feature Combination
Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,
More informationA Periodic Dynamic Load Balancing Method
2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation
More informationImage Filter Using with Gaussian Curvature and Total Variation Model
IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN
International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI
More informationRECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS
RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,
More informationDefining and Surveying Wireless Link Virtualization and Wireless Network Virtualization
1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,
More informationIdentifying Converging Pairs of Nodes on a Budget
Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering
More informationLOSSLESS COMPRESSION OF BAYER MASK IMAGES USING AN OPTIMAL VECTOR PREDICTION TECHNIQUE
1th European Signal Processing Conference (EUSIPCO 2006), Florence, Italy, Septeber -8, 2006, copyright by EUASIP LOSSLESS COMPESSION OF AYE MASK IMAES USIN AN OPTIMAL VECTO PEDICTION TECHNIQUE Stefano
More informationAGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM
International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,
More informationProblem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm
Proble Solving of graph correspondence using Genetics Algorith and ACO Algorith Alireza Rezaee, 1, Azizeh Ajalli 2 Assistant professor,departent of Mechatronics Engineering, Faculty of New Sciences and
More informationClustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering
Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into
More informationOPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS
OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS ADRIAN DEACONU Transilvania University of Brasov, Roania Abstract A linear tie
More informationDistributed Multicast Tree Construction in Wireless Sensor Networks
Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,
More informationP NP. Approximation Algorithms. Computational hardness. Vertex cover. Vertex cover. Vertex cover. Plan: Vertex Cover Metric TSP 3SAT
Great Theoretical Ideas In Coputer Science Victor Adachi CS - Carnegie Mellon University Approxiation Algoriths P NP Plan: Vertex Cover 3SAT Coputational hardness Suppose we are given an NP-coplete proble
More informationTheoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem
Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The
More informationCOMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT
COMPARISON OF ANT COLONY OPTIMIZATION & PARTICLE SWARM OPTIMIZATION IN GRID ENVIRONMENT B.BOOBA 1 Dr. T.V.GOPAL 2 1 Research Scholar, Assist. Professor(Sl.Gr),Departent of Coputer Applications, Easwari
More informationA Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage
216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent
More informationLecture 18 Solving Shortest Path Problem: Dijkstra s Algorithm. October 23, 2009
Solving Shortest Path Problem: Dijkstra s Algorithm October 23, 2009 Outline Lecture 18 Focus on Dijkstra s Algorithm Importance: Where it has been used? Algorithm s general description Algorithm steps
More informationMultipath Selection and Channel Assignment in Wireless Mesh Networks
Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,
More informationDerivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router
Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of
More informationA Hybrid Network Architecture for File Transfers
JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,
More informationClosing The Performance Gap between Causal Consistency and Eventual Consistency
Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive
More informationDesigning High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,
More informationUtility-Based Resource Allocation for Mixed Traffic in Wireless Networks
IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng
More information1 P a g e. F x,x...,x,.,.' written as F D, is the same.
11. The security syste at an IT office is coposed of 10 coputers of which exactly four are working. To check whether the syste is functional, the officials inspect four of the coputers picked at rando
More informationDistributed Multi-robot Work Load Partition In Manufacturing Automation
th IEEE Conference on Autoation Science and Engineering Key Bridge Marriott, Washington DC, USA August 3-, Distributed Multi-robot Work Load Partition In Manufacturing Autoation Gira S Tewolde, Changhua
More informationA Study of the Relationship Between Support Vector Machine and Gabriel Graph
A Study of the Relationship Between Support Vector Machine and Gabriel Graph Wan Zhang and Irwin King {wzhang, king}@cse.cuhk.edu.hk Departent of Coputer Science & Engineering The Chinese University of
More informationEvaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds
Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles
More informationThe Application of Bandwidth Optimization Technique in SLA Negotiation Process
The Application of Bandwidth Optiization Technique in SLA egotiation Process Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia
More informationSecure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals
Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract
More informationReal-Time Detection of Invisible Spreaders
Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract
More informationAnalysing Real-Time Communications: Controller Area Network (CAN) *
Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination
More informationλ-harmonious Graph Colouring Lauren DeDieu
λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex
More informationMeta-heuristic Approaches for the Assembly Line Balancing Problem
Proceedings of the 202 International Conference on Industrial Engineering and Operations Manageent Istanbul, Turey, July 3 6, 202 Meta-heuristic Approaches for the Assebly Line Balancing Proble Adil Bayasoğlu
More informationAdaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN
Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan
More informationOn the Computation and Application of Prototype Point Patterns
On the Coputation and Application of Prototype Point Patterns Katherine E. Tranbarger Freier 1 and Frederic Paik Schoenberg 2 Abstract This work addresses coputational probles related to the ipleentation
More informationTHE rapid growth and continuous change of the real
IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa
More informationA Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design
A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India
More information2 P. S. BRADLEY & O. L. MANGASARIAN 2. The k-plane Clustering (kpc) Algorith We consider a set A of points in the n-diensional real space R n represen
Journal of Global Optiization,, {9 (999) c 999 Kluwer Acadeic Publishers, Boston. Manufactured in The Netherlands. k-plane Clustering P. S. BRADLEY & O. L. MANGASARIAN bradley@icrosoft.co, olvi@cs.wisc.edu
More informationEfficient Estimation of Inclusion Coefficient using HyperLogLog Sketches
Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT
More informationDesign Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems
Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se
More informationSmarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math
Sarter Balanced Assessent Consortiu s, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents
More informationData & Knowledge Engineering
Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID
More informationDesign and Implementation of an Acyclic Stable Matching Scheduler
Design and Ipleentation of an Acyclic Stable Matching Scheduler Enyue Lu Mei Yang Yi Zhang ands.q.zheng Dept. of Coputer Science Dept. of Coputer Science Dept. of Electrical Engineering University of Texas
More informationDeterministic Voting in Distributed Systems Using Error-Correcting Codes
IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract
More informationMIDA: AN IDA SEARCH WITH DYNAMIC CONTROL
April 1991 UILU-ENG-91-2216 CRHC-91-9 Center fo r Reliable and High-Perforance Coputing MIDA: AN IDA SEARCH WITH DYNAMIC CONTROL Benjain W. Wah Coordinated Science Laboratory College of Engineering UNIVERSITY
More informationComputer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13
Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical
More informationPERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL
IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant
More informationPOSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang
IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering
More informationOPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS
Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented
More informationRecursion-Driven Parallel Code Generation for Multi-Core Platforms
Recursion-Driven Parallel Generation for Multi- Platfors Rebecca L. Collins, Bharadwaj Vellore, and Luca P. Carloni Departent of Coputer Science, Colubia University, New York, NY 10027 Eail: {rlc2119,vrb2102,luca}@cs.colubia.edu
More informationControl Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols
Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:
More informationInvestigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks
Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,
More informationNews Events Clustering Method Based on Staging Incremental Single-Pass Technique
News Events Clustering Method Based on Staging Increental Single-Pass Technique LI Yongyi 1,a *, Gao Yin 2 1 School of Electronics and Inforation Engineering QinZhou University 535099 Guangxi, China 2
More informationCollection Selection Based on Historical Performance for Efficient Processing
Collection Selection Based on Historical Perforance for Efficient Processing Christopher T. Fallen and Gregory B. Newby Arctic Region Supercoputing Center University of Alaska Fairbanks Fairbanks, Alaska
More informationThe Internal Conflict of a Belief Function
The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of
More informationThe Boundary Between Privacy and Utility in Data Publishing
The Boundary Between Privacy and Utility in Data Publishing Vibhor Rastogi Dan Suciu Sungho Hong ABSTRACT We consider the privacy proble in data publishing: given a database instance containing sensitive
More informationGalois Homomorphic Fractal Approach for the Recognition of Emotion
Galois Hooorphic Fractal Approach for the Recognition of Eotion T. G. Grace Elizabeth Rani 1, G. Jayalalitha 1 Research Scholar, Bharathiar University, India, Associate Professor, Departent of Matheatics,
More informationFair Resource Allocation for Heterogeneous Tasks
Fair Resource Allocation for Heterogeneous Tasks Koyel Mukherjee, Partha utta, Gurulingesh Raravi, Thangaraj Balasubraania, Koustuv asgupta, Atul Singh Xerox Research Center India, Bangalore, India 560105
More informationQUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS
QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755
More informationCOMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S
COPUTER GEERATED HOLOGRAS Optical Sciences 67 W.J. Dallas (onday, August 3, 004, 1:38 P) PART III: CHAPTER OE DIFFUSERS FOR CGH S Part III: Chapter One Page 1 of 8 Introduction Hologras for display purposes
More informationScheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We
More informationEnergy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks
Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networs F. Mousavi Madani Departent of coputer engineering Alzahra University Tehran, Iran, osavif@alzahra.ac.ir Received:
More informationAdaptive Holistic Scheduling for In-Network Sensor Query Processing
Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,
More informationModeling Parallel Applications Performance on Heterogeneous Systems
Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln
More informationMedical Biophysics 302E/335G/ st1-07 page 1
Medical Biophysics 302E/335G/500 20070109 st1-07 page 1 STEREOLOGICAL METHODS - CONCEPTS Upon copletion of this lesson, the student should be able to: -define the ter stereology -distinguish between quantitative
More informationCHANGE DETECTION OF REMOTE SENSING IMAGES BY DT-CWT AND MRF
ISPRS Hannover Workshop: HRIGI 17 CMRT 17 ISA 17 EuroCOW 17, 6 9 June 2017, Hannover, Gerany CHANGE DETECTION OF REMOTE SENSING IMAGES BY DT-CWT AND MRF Shida OuYang a, Kuikui Fan a,b, Huibing Wang a,
More information3 Conference on Inforation Sciences and Systes, The Johns Hopkins University, March, 3 Sensitivity Characteristics of Cross-Correlation Distance Metric and Model Function F. Porikli Mitsubishi Electric
More informationAn Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints
519 An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured fro Different Viewpoints Yousuke Kawauchi 1, Shin Usuki, Kenjiro T. Miura 3, Hiroshi Masuda 4 and Ichiro Tanaka 5 1 Shizuoka
More informationA Model Free Automatic Tuning Method for a Restricted Structured Controller. by using Simultaneous Perturbation Stochastic Approximation
28 Aerican Control Conference Westin Seattle Hotel, Seattle, Washington, USA June -3, 28 WeC9.5 A Model Free Autoatic Tuning Method for a Restricted Structured Controller by Using Siultaneous Perturbation
More informationA Trajectory Splitting Model for Efficient Spatio-Temporal Indexing
A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada
More informationDetection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm
Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,
More informationarxiv: v1 [cs.dc] 3 Oct 2018
Sparse Winograd Convolutional neural networks on sall-scale systolic arrays Feng Shi, Haochen Li, Yuhe Gao, Benjain Kuschner, Song-Chun Zhu University of California Los Angeles Los Angeles, USA {shi.feng,sczh}@cs.ucla.edu
More informationData Caching for Enhancing Anonymity
Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu
More informationThreshold Analysis of Non-Binary Spatially-Coupled LDPC Codes with Windowed Decoding
1 Threshold Analysis of Non-Binary Spatially-Coupled LDPC Codes with Windowed Decoding Lai Wei, Toshiaki Koike-Akino, David G. M. Mitchell, Thoas E. Fuja, and Daniel J. Costello, Jr. Departent of Electrical
More informationPerformance Analysis of RAID in Different Workload
Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,
More informationA Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction
MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao
More informationA Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem
IE Vol. 7, No. 2, pp. 84-92, Septeber 2008. A Coparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Proble Ji Ung Sun School of Industrial and Managent Engineering Hankuk University
More informationRelocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction
Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,
More informationRegular and Irreguar m-polar Fuzzy Graphs
Global Journal of Matheatical Sciences: Theory and Practical. ISSN 0974-300 Volue 9, Nuber 07, pp. 39-5 International Research Publication House http://www.irphouse.co Regular and Irreguar -polar Fuzzy
More informationAn Optimization Clustering Algorithm Based on Texture Feature Fusion for Color Image Segmentation
Algoriths 2015, 8, 234-247; doi:10.3390/a8020234 Article OPEN ACCESS algoriths ISSN 1999-4893 www.dpi.co/journal/algoriths An Optiization Clustering Algorith Based on Texture Feature Fusion for Color Iage
More informationEnhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue
Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade
More informationRule Extraction using Artificial Neural Networks
Rule Extraction using Artificial Neural Networks S. M. Karuzzaan 1 Ahed Ryadh Hasan 2 Abstract Artificial neural networks have been successfully applied to a variety of business application probles involving
More informationUsing Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses
International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization
More information