Simulation of Reliability in Multi-server Computer Networks
|
|
- Iris Freeman
- 6 years ago
- Views:
Transcription
1 Simulation of Reliability in Multi-server Computer Networks SAULIUS MINKEVIČIUS, VU Institute of Mathematics Informatics, Akademijos 4, Vilnius, Lithuania Vilnius University Mathematics Informatics faculty, Naugarduko 24, LT Vilnius, LITHUANIA Abstract: -The performance in terms of reliability of multi-server computer networks motivates this paper. The probability limit theorem is derived on the virtual waiting time of job in nodes in a multi-server open queueing network applied to a reliability model for multi-server computer networks we relate the time of failure of a multi-server computer network to the system parameters. Key-Words: - Performance evaluation, reliability theory, queuing theory, mathematical models of technical systems, multi-server open queuing network, heavy traffic, the probability limit theorem, a virtual waiting time of job in nodes in a multi-server open queuing network. 1 Introduction Probabilistic models queuing networks have long been used to study the performance reliability of computer systems [4, 5] to analyse the performance reliability of computer networks of distributed information systems [6, 7]. In this paper, we will first review the works related to using the queuing theory of computer systems reliability, then present some new results on the estimation of the time of failure of a computer network. In one of the first papers of this kind [20], an an efficient algorithm was investigated for the reliability of a circular consecutive-k-out-of-n system. The author in paper [10] considers network topological optimization with a reliability constraint. In [9] the classical twoterminal reliability is extended for a wireless computer network. Papers [13, 1] investigated the reliability of distributed systems computer networks in which computing nodes communication links may fail with certain probabilities. In [12] limit theorems on the extreme queue length extreme virtual waiting time in open queuing networks in heavy traffic are derived applied to a reliability model for computer networks. In [18, 19], the primitives, concepts, terminology, fundamental ideas of service reliability theory engineering were developed. Also, the purpose of these papers is to describe some mathematical models useful for service reliability engineering to illustrate the use of these ideas by some examples. Paper [3] investigated heavy traffic asymptotics for systems with unreliable servers. In this paper, we present the probability limit theorem on the virtual waiting time of job in nodes of a multi-server open queuing network in heavy traffic conditions. 2 The Network Model Consider a network of stations, indexed by The station has servers, indexed by. A description of the primitive data construction of processes of interest are the focus of this section. No probability space will be mentioned in this section, of course, one can always think that all the variables processes are defined on the same probability space. First, are sequences of exogenous interarrival times, is the interarrival time between the job the st job which arrive at the station j exogenously (from the outside of the network). Define is called the exogenous arrival process of the station j, i.e., counts the number of jobs that arrived at the station from the outside of the network. ISBN:
2 Second, are service times, sequences of is the service time for the th customer served by the server of the station Define is called a service process for the server at the station, i.e., counts the number of services completed by the server at the station during the server s busy time. We note with all of these terms assumed finite. In addition, let be the total number of jobs routed to the th station of the network in the interval be the total number of jobs after service departure from the th station of the network in the interval be the total number of jobs routed to the server of the th station of the network in the interval let be the total number of customers after service departure from the server of the th station of the network in the interval be the total number of jobs after service departure from the server of the th station of the network routed to the server of the th station of the network in the interval Let be a probability of the job after service at the th station of the network routed to the th station of the network. Denote as part of the total number of jobs which, after service at the server of the th station of the network, are routed to the server of the th station of the network in the interval Also let as the total amount of time that a server at the station is busy in the interval Now we introduce the following processes, indicates the number of jobs (queue of length) waiting to be served by the server of the station at time Now we introduce the following processes, indicates the virtual waiting time of job (workload process) in server of the station at time ; The dynamics of the queuing system (to be specified) depends on the service discipline at each service station. To be more precise, first come, first served (FCFS) service discipline is assumed for all stations. When a customer arrives at a station finds more than one server available, it will join one of the servers with the smallest index. We assume that the service station is work conserving; namely, not all servers at a station can be idle when there are customers waiting for service at that station. In particular, we assume that a station must serve at its full capacity when the number of jobs waiting is equal to or exceeds the number of servers at that station. 3 The Main Results Now we present probability limit theorem for the virtual waiting time of job in nodes of a multi-server open queuing network. Similarly as in [11], let us investigate multi-server open queuing networks in a series: are independent identically distributed rom variables in the th network;. Also, we define Let us denote We will also assume that the following overload conditions" are fulfilled. (1) ISBN:
3 Note that these conditions quarantee that the length of all the queues will grow indefinitely with probability one. The results of the present paper are based on the following theorem: Theorem 3.1. If conditions (1) are fulfilled, then Proof. Applying the results of paper [2], we see that virtual waiting time of job (workload process) in server of station is equal Denote (2) Proof. At first, using Theorem 3.1, we get that for Let us investigate a computer network node, which consists of elements (computers), Denote Note that Denote the structural function of the system of elements connected by scheme 1 from (see, for example, [13], as follows: At first we will prove that At last we have that (3) of the computer node. Suppose is the parameter of failure (4) are stard Wiener processes, Thus, using the convergence together theorem from (3) (4) we derive that is stard Wiener processes, By [11], for the vector convergence to hold it suffices that a limit process is continuous in Using this note we complete the proof of the theorem. Let us estimate the reliability function of the system (computer network) using the formula of a conditional probability for the reliability function of the computer node Note that But for fixed we have that 4 The Reliability of a Multi-server Computer Network Theorem 4.1. If conditions (1) are fulfilled, the computer network becomes unreliable (all computers fail). ISBN:
4 Finally, we denote as a probability of blocking (workload process) of the server in node in a multi-server computer network, So, is the probability of blocking of the whole multi-server computer network (because if Thus, (5) Applying Theorem 3.1, we obtain that for then for all ),. Thus, we prove the following corollary about the probability of blocking of a multi-server computer network. Corollary 5.1. If conditions (1) are fulfilled, then (6) 6 Proof. Denote we achieve that as a complement of set A. Thus, It follows from (6) that (7) Consequently, (see (4) (6)), which completes the proof. (8) 5 Applications of the Main Results At first we present a theorem about the fluid approximation for the virtual waiting time of job in nodes of a multi-server open queuing network under heavy traffic conditions. Theorem 5.1. If conditions (1) are fulfilled, then If conditions (1) are satisfied, let us prove that. Next, we present the law of the iterated logarithm for the virtual waiting time of job in nodes of a multi-server open queuing network under heavy traffic conditions. Theorem 5.2. If conditions (1) are satisfied, then But for applying Theorem 3.1 we obtain (9) is the normal distribution function. Consequently, we derive that (see (7) (9)) ISBN:
5 or The proof of Corollary 5.1 is complete. Consequently, if conditions (1) are fulfilled, then the whole multi-server network is busy. Consequently, if conditions (1) are fulfilled, then the whole multi-server network is busy. 6 Concluding remarks future research 1. If the conditions of the theorem on the probability limit theorem are fulfilled (i. e., conditions (1) are satisfied), the network is occupied at first (see Corollary 4.1) if conditions (1) are satisfied later on, the network becomes uncontrollable after a certain time (as ) (see Corollary 5.1). 2. Conditions (1) are fundamental, - the behaviour of the whole network its evolution is not clear, if conditions (1) are not satisfied. Therefore, this fact is the object of further research discussion. 3. Note that the computer with the Windows opera- =tion system functions steadily, if the number of jobs does not exceed 5 (therefore,. In the opposite cases, the computer fails (see paragraph 1). 4. The theorems of this paper are proved for a class of a multi-server open queuing network in heavy traffic with the service principle ``first come, first served", endless waiting time of a customer in each node of the queuing system, the times between the arrival of customers at the multi-server open queuing networks are independent identically distributed rom variables. However, analogous theorems can be applied to a wider class of multiserver open queuing networks in heavy traffic: when the arrival service of customers in a queue is by groups, when interarrival times of customers at the multi-server open queuing network are weakly dependent rom variables, etc. References: [1] Yinong Chen, Zhongshi He,.Bounds on the reliability of distributed systems with unreliable nodes links, IEEE Transactions on Reliability, Vol.53, No.2, 2004, pp [2] H. Chen H., Shanthikumar J. George. Fluid limits diffusion approximations for networks of multi-server queues in heavy traffic, Discrete Event Dynamic Systems, Vol.4, 1994, pp [3] Jean Francois Dantzer, Isi Mitrani, Philippe Robert. Large scale heavy traffic asymptotics for systems with unreliable servers, Institut National De Recherche En Informatique Et En Automatique}, 3807, November [4] E. Gelenbe, Unified approach to the evaluation of a class of replacement algorithms, IEEE Transactions on Computers, Vol. C22, No. 6, pp [5] E. Gelenbe, Probabilistic models of computer systems, Part II, Acta Informatica, Vol,12, pp , [6] E. Gelenbe, D. Finkel, S.K. Tripathi Availability of a distributed computer system with failures, Acta Informatica, 23 (6): , November [7] E. Gelenbe, X.W. Wang., R. Onvural Diffusion based statistical call admission control in ATM, Performance Evaluation}, Vol.27, No.8, 1996, pp [8] E. Gelenbe, J.M. Fourneau, G-networks with resets, Performance Evaluation, Vol.49, No.(1-4), 2002, pp [9] Sahin Yasar. Algorithm design for reliability analysis in mobile communication networks, Journal Of Aeronautics And Space Technologies, Vol. 3, No.1, 2007, pp [10] Rong Hong Jan, Fung Jen Hwang, Sheng Tzong Cheng, Topological optimization of a communication network subject to a reliability constraint, IEEE Transactions on Reliability, Vol.42, No. 1, 1993, pp [11] S. Minkevičius, Weak convergence in multiphase queues, Lietuvos Matematikos Rinkinys, Vol. 26, 1986, pp , (in Russian). [12] S. Minkevičius, Analysis of the componentbased reliability in computer networks, CUBO A Mathematical Journal, Vol. 12, No. 1, 2010, pp [13] H. Mohamed, S. Mohamed, Yang Xiaozong, Liu Hongwei Wu Zhibo, An efficient algorithm for reliability upper bound of distributed systems with unreliable nodes, International Journal on Computer Science Engineering, Vol. 02, No 02, 2010, pp [14] J.J. Morder, S. E. Elmaghraby (eds.), Hbook of operational research models applications, Van Nostr Reinhold, New York, [15] L.L. Sakalauskas, S. Minkevičius. On the law of the iterated logarithm in open queueing ISBN:
6 networks, European Journal of Operational Research, Vol. 120, 2000, pp , [16] L.L. Sakalauskas, S. Minkevičius. Nonlinear phenomena in digital networks. II, Information Technology Control, 2014, to appear. [17] V. Zubov (ed.) Mathematical theory of reliability of queueing systems, Radio i Sviaz, [18] M. Tortorella, Service reliability theory engineering, I: fundamentals, Quality Technology Quantitative Management, Vol. 2, No. 1, 2005, pp [19] M. Tortorella, Service reliability theory engineering, II: models examples, Quality Technology Quantitative Management, Vol. 2, No. 1, 2005, pp [20] Jer Shyan Wu, Rong Jaye Chen, Efficient algorithm for reliability of a circular consecutive-k-out-of-n system, IEEE Transactions on Reliability, Vol. 42, No. 1, 1993, pp ISBN:
Fuzzy Queueing Model Using DSW Algorithm
Fuzzy Queueing Model Using DSW Algorithm R. Srinivasan Department of Mathematics, Kongunadu College of Engineering and Technology, Tiruchirappalli 621215, Tamilnadu ABSTRACT--- This paper proposes a procedure
More informationLecture 15: The subspace topology, Closed sets
Lecture 15: The subspace topology, Closed sets 1 The Subspace Topology Definition 1.1. Let (X, T) be a topological space with topology T. subset of X, the collection If Y is a T Y = {Y U U T} is a topology
More informationDelay-minimal Transmission for Energy Constrained Wireless Communications
Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu
More informationQueuing Systems. 1 Lecturer: Hawraa Sh. Modeling & Simulation- Lecture -4-21/10/2012
Queuing Systems Queuing theory establishes a powerful tool in modeling and performance analysis of many complex systems, such as computer networks, telecommunication systems, call centers, manufacturing
More informationThe strong chromatic number of a graph
The strong chromatic number of a graph Noga Alon Abstract It is shown that there is an absolute constant c with the following property: For any two graphs G 1 = (V, E 1 ) and G 2 = (V, E 2 ) on the same
More informationBANK ATM QUEUEING MODEL: A CASE STUDY Ashish Upadhayay* 1
ISSN 2277-2685 IJESR/May 2017/ Vol-7/Issue-5/40-45 Ashish Upadhayay / International Journal of Engineering & Science Research BANK ATM QUEUEING MODEL: A CASE STUDY Ashish Upadhayay* 1 1 Research Scholar,
More informationOn the Maximum Throughput of A Single Chain Wireless Multi-Hop Path
On the Maximum Throughput of A Single Chain Wireless Multi-Hop Path Guoqiang Mao, Lixiang Xiong, and Xiaoyuan Ta School of Electrical and Information Engineering The University of Sydney NSW 2006, Australia
More informationAN APPROXIMATION APPROACH FOR RANKING FUZZY NUMBERS BASED ON WEIGHTED INTERVAL - VALUE 1.INTRODUCTION
Mathematical and Computational Applications, Vol. 16, No. 3, pp. 588-597, 2011. Association for Scientific Research AN APPROXIMATION APPROACH FOR RANKING FUZZY NUMBERS BASED ON WEIGHTED INTERVAL - VALUE
More informationDiscrete Applied Mathematics
Discrete Applied Mathematics 160 (2012) 505 512 Contents lists available at SciVerse ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam 1-planarity of complete multipartite
More informationVHDL framework for modeling fuzzy automata
Doru Todinca Daniel Butoianu Department of Computers Politehnica University of Timisoara SYNASC 2012 Outline Motivation 1 Motivation Why fuzzy automata? Why a framework for modeling FA? Why VHDL? 2 Fuzzy
More informationPANCYCLICITY WHEN EACH CYCLE CONTAINS k CHORDS
Discussiones Mathematicae Graph Theory xx (xxxx) 1 13 doi:10.7151/dmgt.2106 PANCYCLICITY WHEN EACH CYCLE CONTAINS k CHORDS Vladislav Taranchuk Department of Mathematics and Statistics California State
More informationSection 13. Basis for a Topology
13. Basis for a Topology 1 Section 13. Basis for a Topology Note. In this section, we consider a basis for a topology on a set which is, in a sense, analogous to the basis for a vector space. Whereas a
More informationOn the Complexity of the Policy Improvement Algorithm. for Markov Decision Processes
On the Complexity of the Policy Improvement Algorithm for Markov Decision Processes Mary Melekopoglou Anne Condon Computer Sciences Department University of Wisconsin - Madison 0 West Dayton Street Madison,
More informationMAXIMUM WIENER INDEX OF TREES WITH GIVEN SEGMENT SEQUENCE
MAXIMUM WIENER INDEX OF TREES WITH GIVEN SEGMENT SEQUENCE ERIC OULD DADAH ANDRIANTIANA, STEPHAN WAGNER, AND HUA WANG Abstract. A segment of a tree is a path whose ends are branching vertices (vertices
More informationSome Properties of Soft -Open Sets in Soft Topological Space
IOSR Journal of Mathematics (IOSR-JM) e-issn: 2278-5728, p-issn:2319-765x. Volume 9, Issue 6 (Jan. 2014), PP 20-24 Some Properties of Soft -Open Sets in Soft Topological Space a Gnanambal Ilango, b B.
More informationA C 2 Four-Point Subdivision Scheme with Fourth Order Accuracy and its Extensions
A C 2 Four-Point Subdivision Scheme with Fourth Order Accuracy and its Extensions Nira Dyn School of Mathematical Sciences Tel Aviv University Michael S. Floater Department of Informatics University of
More informationDistributed minimum spanning tree problem
Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with
More informationSome Inequalities Involving Fuzzy Complex Numbers
Theory Applications o Mathematics & Computer Science 4 1 014 106 113 Some Inequalities Involving Fuzzy Complex Numbers Sanjib Kumar Datta a,, Tanmay Biswas b, Samten Tamang a a Department o Mathematics,
More informationGenerell Topologi. Richard Williamson. May 6, 2013
Generell Topologi Richard Williamson May 6, 2013 1 8 Thursday 7th February 8.1 Using connectedness to distinguish between topological spaces I Proposition 8.1. Let (, O ) and (Y, O Y ) be topological spaces.
More informationTitle: Increasing the stability and robustness of simulation-based network assignment models for largescale
Title: Increasing the stability and robustness of simulation-based network assignment models for largescale applications Author: Michael Mahut, INRO Consultants Inc. Larger-scale dynamic network models
More informationAXIOMS FOR THE INTEGERS
AXIOMS FOR THE INTEGERS BRIAN OSSERMAN We describe the set of axioms for the integers which we will use in the class. The axioms are almost the same as what is presented in Appendix A of the textbook,
More informationRADIO LABELING OF SOME LADDER-RELATED GRAPHS
RADIO LABELING OF SOME LADDER-RELATED GRAPHS ALI AHMAD and RUXANDRA MARINESCU-GHEMECI Communicated by Ioan Tomescu Let d(u, v) denote the distance between two distinct vertices of a connected graph G,
More informationAn Efficient Queuing Model for Resource Sharing in Cloud Computing
The International Journal Of Engineering And Science (IJES) Volume 3 Issue 10 Pages 36-43 2014 ISSN (e): 2319 1813 ISSN (p): 2319 1805 An Efficient Queuing Model for Resource Sharing in Cloud Computing
More informationSpeed-up of Parallel Processing of Divisible Loads on k-dimensional Meshes and Tori
The Computer Journal, 46(6, c British Computer Society 2003; all rights reserved Speed-up of Parallel Processing of Divisible Loads on k-dimensional Meshes Tori KEQIN LI Department of Computer Science,
More informationStability Analysis of M-Dimensional Asynchronous Swarms With a Fixed Communication Topology
76 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 48, NO. 1, JANUARY 2003 Stability Analysis of M-Dimensional Asynchronous Swarms With a Fixed Communication Topology Yang Liu, Member, IEEE, Kevin M. Passino,
More informationSome bounds on chromatic number of NI graphs
International Journal of Mathematics and Soft Computing Vol.2, No.2. (2012), 79 83. ISSN 2249 3328 Some bounds on chromatic number of NI graphs Selvam Avadayappan Department of Mathematics, V.H.N.S.N.College,
More informationEND-TO-END estimation of the spare capacity along a network
130 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 16, NO. 1, FEBRUARY 2008 A Stochastic Foundation of Available Bandwidth Estimation: Multi-Hop Analysis Xiliang Liu, Kaliappa Ravindran, and Dmitri Loguinov,
More informationGeneralized Convex Set-Valued Maps
Generalized Convex Set-Valued Maps September 20, 2008 Joël Benoist Department of Mathematics LACO URA-CNRS 1586 University of Limoges 87060 Limoges, France E-mail: benoist@unilim.fr Nicolae Popovici Faculty
More informationStar Forests, Dominating Sets and Ramsey-type Problems
Star Forests, Dominating Sets and Ramsey-type Problems Sheila Ferneyhough a, Ruth Haas b,denis Hanson c,1 and Gary MacGillivray a,1 a Department of Mathematics and Statistics, University of Victoria, P.O.
More informationON WIENER INDEX OF GRAPH COMPLEMENTS. Communicated by Alireza Abdollahi. 1. Introduction
Transactions on Combinatorics ISSN (print): 51-8657, ISSN (on-line): 51-8665 Vol. 3 No. (014), pp. 11-15. c 014 University of Isfahan www.combinatorics.ir www.ui.ac.ir ON WIENER INDEX OF GRAPH COMPLEMENTS
More informationPreemptive Scheduling of Equal-Length Jobs in Polynomial Time
Preemptive Scheduling of Equal-Length Jobs in Polynomial Time George B. Mertzios and Walter Unger Abstract. We study the preemptive scheduling problem of a set of n jobs with release times and equal processing
More informationarxiv: v1 [math.co] 24 Oct 2012
On a relation between the Szeged index and the Wiener index for bipartite graphs arxiv:110.6460v1 [math.co] 4 Oct 01 Lily Chen, Xueliang Li, Mengmeng Liu Center for Combinatorics, LPMC-TJKLC Nankai University,
More informationConstructions of hamiltonian graphs with bounded degree and diameter O(log n)
Constructions of hamiltonian graphs with bounded degree and diameter O(log n) Aleksandar Ilić Faculty of Sciences and Mathematics, University of Niš, Serbia e-mail: aleksandari@gmail.com Dragan Stevanović
More informationON THE SUM OF THE SQUARES OF ALL DISTANCES IN SOME GRAPHS
ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS N. 38 017 (137 144) 137 ON THE SUM OF THE SQUARES OF ALL DISTANCES IN SOME GRAPHS Xianya Geng Zhixiang Yin Xianwen Fang Department of Mathematics and Physics
More informationDiscrete Time Batch Arrival Queue with Multiple Vacations
International Journal of Engineering Research Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 13, Issue 7 (July 2017), PP.49-55 Discrete Time Batch Arrival Queue with Multiple Vacations
More informationSelf-formation, Development and Reproduction of the Artificial System
Solid State Phenomena Vols. 97-98 (4) pp 77-84 (4) Trans Tech Publications, Switzerland Journal doi:.48/www.scientific.net/ssp.97-98.77 Citation (to be inserted by the publisher) Copyright by Trans Tech
More informationRead Chapter 4 of Kurose-Ross
CSE 422 Notes, Set 4 These slides contain materials provided with the text: Computer Networking: A Top Down Approach,5th edition, by Jim Kurose and Keith Ross, Addison-Wesley, April 2009. Additional figures
More informationOptimization Problems Under One-sided (max, min)-linear Equality Constraints
WDS'12 Proceedings of Contributed Papers, Part I, 13 19, 2012. ISBN 978-80-7378-224-5 MATFYZPRESS Optimization Problems Under One-sided (max, min)-linear Equality Constraints M. Gad Charles University,
More informationInfinite locally random graphs
Infinite locally random graphs Pierre Charbit and Alex D. Scott Abstract Motivated by copying models of the web graph, Bonato and Janssen [3] introduced the following simple construction: given a graph
More informationMaximum number of edges in claw-free graphs whose maximum degree and matching number are bounded
Maximum number of edges in claw-free graphs whose maximum degree and matching number are bounded Cemil Dibek Tınaz Ekim Pinar Heggernes Abstract We determine the maximum number of edges that a claw-free
More informationSome Topological Indices of Spider s Web Planar Graph
Applied Mathematical Sciences, Vol. 6, 0, no. 63, 345-355 Some Topological Indices of Spider s Web Planar Graph Mohamed Essalih LRIT associated unit to CNRST (URAC 9), Faculty of Sciences, Mohammed V-Agdal
More informationStudy of Load Balancing Schemes over a Video on Demand System
Study of Load Balancing Schemes over a Video on Demand System Priyank Singhal Ashish Chhabria Nupur Bansal Nataasha Raul Research Scholar, Computer Department Abstract: Load balancing algorithms on Video
More informationOn Soft Topological Linear Spaces
Republic of Iraq Ministry of Higher Education and Scientific Research University of AL-Qadisiyah College of Computer Science and Formation Technology Department of Mathematics On Soft Topological Linear
More informationComparative Study of blocking mechanisms for Packet Switched Omega Networks
Proceedings of the 6th WSEAS Int. Conf. on Electronics, Hardware, Wireless and Optical Communications, Corfu Island, Greece, February 16-19, 2007 18 Comparative Study of blocking mechanisms for Packet
More informationMarkov Chains and Multiaccess Protocols: An. Introduction
Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science
More informationThe Space of Closed Subsets of a Convergent Sequence
The Space of Closed Subsets of a Convergent Sequence by Ashley Reiter and Harold Reiter Many topological spaces are simply sets of points(atoms) endowed with a topology Some spaces, however, have elements
More informationEVALUATION OF THREE CAC METHODS: GAUSSIAN APPROXIMATION METHOD, METHOD OF EFFECTIVE BANDWIDTH AND DIFFUSION APPROXIMATION METHOD
Journal of ELECTRICAL ENGINEERING, VOL. 57, NO. 6, 2006, 360 364 EVALUATION OF THREE CAC METHODS: GAUSSIAN APPROXIMATION METHOD, METHOD OF EFFECTIVE BANDWIDTH AND DIFFUSION APPROXIMATION METHOD Peter Kvačkaj
More informationA C 2 Four-Point Subdivision Scheme with Fourth Order Accuracy and its Extensions
A C 2 Four-Point Subdivision Scheme with Fourth Order Accuracy and its Extensions Nira Dyn Michael S. Floater Kai Hormann Abstract. We present a new four-point subdivision scheme that generates C 2 curves.
More informationPerformance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks
Performance Characteristics of a Packet-Based Leaky-Bucket Algorithm for ATM Networks Toshihisa OZAWA Department of Business Administration, Komazawa University 1-23-1 Komazawa, Setagaya-ku, Tokyo 154-8525,
More informationOn Fuzzy Topological Spaces Involving Boolean Algebraic Structures
Journal of mathematics and computer Science 15 (2015) 252-260 On Fuzzy Topological Spaces Involving Boolean Algebraic Structures P.K. Sharma Post Graduate Department of Mathematics, D.A.V. College, Jalandhar
More informationIntroduction to Queuing Systems
Introduction to Queuing Systems Queuing Theory View network as collections of queues FIFO data-structures Queuing theory provides probabilistic analysis of these queues Examples: Average length Probability
More informationImproving the scheduling analysis of hard real-time traffic by analyzing traffic dependencies
TECHNICAL REPORT IDE0892 Improving the scheduling analysis of hard real-time traffic by analyzing traffic dependencies KRISTINA KUNERT School of Information Science, Computer and Electrical Engineering
More informationEpisode 5. Scheduling and Traffic Management
Episode 5. Scheduling and Traffic Management Part 2 Baochun Li Department of Electrical and Computer Engineering University of Toronto Keshav Chapter 9.1, 9.2, 9.3, 9.4, 9.5.1, 13.3.4 ECE 1771: Quality
More informationDeduction and Logic Implementation of the Fractal Scan Algorithm
Deduction and Logic Implementation of the Fractal Scan Algorithm Zhangjin Chen, Feng Ran, Zheming Jin Microelectronic R&D center, Shanghai University Shanghai, China and Meihua Xu School of Mechatronical
More informationarxiv: v1 [math.co] 13 Aug 2017
Strong geodetic problem in grid like architectures arxiv:170803869v1 [mathco] 13 Aug 017 Sandi Klavžar a,b,c April 11, 018 Paul Manuel d a Faculty of Mathematics and Physics, University of Ljubljana, Slovenia
More information(i, j)-almost Continuity and (i, j)-weakly Continuity in Fuzzy Bitopological Spaces
International Journal of Scientific and Innovative Mathematical Research (IJSIMR) Volume 4, Issue 2, February 2016, PP 89-98 ISSN 2347-307X (Print) & ISSN 2347-3142 (Online) www.arcjournals.org (i, j)-almost
More informationEDGE MAXIMAL GRAPHS CONTAINING NO SPECIFIC WHEELS. Jordan Journal of Mathematics and Statistics (JJMS) 8(2), 2015, pp I.
EDGE MAXIMAL GRAPHS CONTAINING NO SPECIFIC WHEELS M.S.A. BATAINEH (1), M.M.M. JARADAT (2) AND A.M.M. JARADAT (3) A. Let k 4 be a positive integer. Let G(n; W k ) denote the class of graphs on n vertices
More informationSome new results on circle graphs. Guillermo Durán 1
Some new results on circle graphs Guillermo Durán 1 Departamento de Ingeniería Industrial, Facultad de Ciencias Físicas y Matemáticas, Universidad de Chile, Santiago, Chile gduran@dii.uchile.cl Departamento
More informationTopology and Topological Spaces
Topology and Topological Spaces Mathematical spaces such as vector spaces, normed vector spaces (Banach spaces), and metric spaces are generalizations of ideas that are familiar in R or in R n. For example,
More informationON SWELL COLORED COMPLETE GRAPHS
Acta Math. Univ. Comenianae Vol. LXIII, (1994), pp. 303 308 303 ON SWELL COLORED COMPLETE GRAPHS C. WARD and S. SZABÓ Abstract. An edge-colored graph is said to be swell-colored if each triangle contains
More informationREPRESENTATION OF BIG DATA BY DIMENSION REDUCTION
Fundamental Journal of Mathematics and Mathematical Sciences Vol. 4, Issue 1, 2015, Pages 23-34 This paper is available online at http://www.frdint.com/ Published online November 29, 2015 REPRESENTATION
More informationSection 17. Closed Sets and Limit Points
17. Closed Sets and Limit Points 1 Section 17. Closed Sets and Limit Points Note. In this section, we finally define a closed set. We also introduce several traditional topological concepts, such as limit
More informationRough Connected Topologized. Approximation Spaces
International Journal o Mathematical Analysis Vol. 8 04 no. 53 69-68 HIARI Ltd www.m-hikari.com http://dx.doi.org/0.988/ijma.04.4038 Rough Connected Topologized Approximation Spaces M. J. Iqelan Department
More informationAlgorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain
Algorithms on Minimizing the Maximum Sensor Movement for Barrier Coverage of a Linear Domain Danny Z. Chen 1, Yan Gu 2, Jian Li 3, and Haitao Wang 1 1 Department of Computer Science and Engineering University
More informationAdjacent Vertex Distinguishing Incidence Coloring of the Cartesian Product of Some Graphs
Journal of Mathematical Research & Exposition Mar., 2011, Vol. 31, No. 2, pp. 366 370 DOI:10.3770/j.issn:1000-341X.2011.02.022 Http://jmre.dlut.edu.cn Adjacent Vertex Distinguishing Incidence Coloring
More informationComponent Connectivity of Generalized Petersen Graphs
March 11, 01 International Journal of Computer Mathematics FeHa0 11 01 To appear in the International Journal of Computer Mathematics Vol. 00, No. 00, Month 01X, 1 1 Component Connectivity of Generalized
More information2. Sets. 2.1&2.2: Sets and Subsets. Combining Sets. c Dr Oksana Shatalov, Fall
c Dr Oksana Shatalov, Fall 2014 1 2. Sets 2.1&2.2: Sets and Subsets. Combining Sets. Set Terminology and Notation DEFINITIONS: Set is well-defined collection of objects. Elements are objects or members
More informationLecture 4: examples of topological spaces, coarser and finer topologies, bases and closed sets
Lecture 4: examples of topological spaces, coarser and finer topologies, bases and closed sets Saul Glasman 14 September 2016 Let s give the definition of an open subset of R. Definition 1. Let U R. We
More informationFUDMA Journal of Sciences (FJS) Maiden Edition Vol. 1 No. 1, November, 2017, pp ON ISOMORPHIC SOFT LATTICES AND SOFT SUBLATTICES
FUDMA Journal of Sciences (FJS) Maiden Edition Vol 1 No 1 November 2017 pp 28-34 ON ISOMORPHIC SOFT LATTICES AND SOFT SUBLATTICES * A O Yusuf 1 A M Ibrahim 2 1 Department of Mathematical Sciences Information
More informationProperly Colored Paths and Cycles in Complete Graphs
011 ¼ 9 È È 15 ± 3 ¾ Sept., 011 Operations Research Transactions Vol.15 No.3 Properly Colored Paths and Cycles in Complete Graphs Wang Guanghui 1 ZHOU Shan Abstract Let K c n denote a complete graph on
More information3 No-Wait Job Shops with Variable Processing Times
3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select
More informationLecture 1. 1 Notation
Lecture 1 (The material on mathematical logic is covered in the textbook starting with Chapter 5; however, for the first few lectures, I will be providing some required background topics and will not be
More informationAdvanced Internet Technologies
Advanced Internet Technologies Chapter 3 Performance Modeling Dr.-Ing. Falko Dressler Chair for Computer Networks & Internet Wilhelm-Schickard-Institute for Computer Science University of Tübingen http://net.informatik.uni-tuebingen.de/
More informationA GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY
A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY KARL L. STRATOS Abstract. The conventional method of describing a graph as a pair (V, E), where V and E repectively denote the sets of vertices and edges,
More informationComparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function
Comparison of pre-backoff and post-backoff procedures for IEEE 802.11 distributed coordination function Ping Zhong, Xuemin Hong, Xiaofang Wu, Jianghong Shi a), and Huihuang Chen School of Information Science
More informationMath 302 Introduction to Proofs via Number Theory. Robert Jewett (with small modifications by B. Ćurgus)
Math 30 Introduction to Proofs via Number Theory Robert Jewett (with small modifications by B. Ćurgus) March 30, 009 Contents 1 The Integers 3 1.1 Axioms of Z...................................... 3 1.
More informationMinimum congestion spanning trees of grids and discrete toruses
Minimum congestion spanning trees of grids and discrete toruses A. Castejón Department of Applied Mathematics I Higher Technical School of Telecommunications Engineering (ETSIT) Universidad de Vigo Lagoas-Marcosende
More informationThe Fibonacci hypercube
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 40 (2008), Pages 187 196 The Fibonacci hypercube Fred J. Rispoli Department of Mathematics and Computer Science Dowling College, Oakdale, NY 11769 U.S.A. Steven
More informationApplication of QNA to analyze the Queueing Network Mobility Model of MANET
1 Application of QNA to analyze the Queueing Network Mobility Model of MANET Harsh Bhatia 200301208 Supervisor: Dr. R. B. Lenin Co-Supervisors: Prof. S. Srivastava Dr. V. Sunitha Evaluation Committee no:
More informationThe Edge Fixing Edge-To-Vertex Monophonic Number Of A Graph
Applied Mathematics E-Notes, 15(2015), 261-275 c ISSN 1607-2510 Available free at mirror sites of http://www.math.nthu.edu.tw/ amen/ The Edge Fixing Edge-To-Vertex Monophonic Number Of A Graph KrishnaPillai
More informationApplication of Network Calculus to the TSN Problem Space
Application of Network Calculus to the TSN Problem Space Jean Yves Le Boudec 1,2,3 EPFL IEEE 802.1 Interim Meeting 22 27 January 2018 1 https://people.epfl.ch/105633/research 2 http://smartgrid.epfl.ch
More information= [ U 1 \ U 2 = B \ [ B \ B.
5. Mon, Sept. 8 At the end of class on Friday, we introduced the notion of a topology, and I asked you to think about how many possible topologies there are on a 3-element set. The answer is... 29. The
More informationSIMULATION OF ARTIFICIAL SYSTEMS BEHAVIOR IN PARAMETRIC EIGHT-DIMENSIONAL SPACE
78 Proceedings of the 4 th International Conference on Informatics and Information Technology SIMULATION OF ARTIFICIAL SYSTEMS BEHAVIOR IN PARAMETRIC EIGHT-DIMENSIONAL SPACE D. Ulbikiene, J. Ulbikas, K.
More informationDisjoint directed cycles
Disjoint directed cycles Noga Alon Abstract It is shown that there exists a positive ɛ so that for any integer k, every directed graph with minimum outdegree at least k contains at least ɛk vertex disjoint
More informationOn Jeśmanowicz Conjecture Concerning Pythagorean Triples
Journal of Mathematical Research with Applications Mar., 2015, Vol. 35, No. 2, pp. 143 148 DOI:10.3770/j.issn:2095-2651.2015.02.004 Http://jmre.dlut.edu.cn On Jeśmanowicz Conjecture Concerning Pythagorean
More informationOpen and Closed Sets
Open and Closed Sets Definition: A subset S of a metric space (X, d) is open if it contains an open ball about each of its points i.e., if x S : ɛ > 0 : B(x, ɛ) S. (1) Theorem: (O1) and X are open sets.
More informationIntroduction: Two motivating examples for the analytical approach
Introduction: Two motivating examples for the analytical approach Hongwei Zhang http://www.cs.wayne.edu/~hzhang Acknowledgement: this lecture is partially based on the slides of Dr. D. Manjunath Outline
More informationProgress Towards the Total Domination Game 3 4 -Conjecture
Progress Towards the Total Domination Game 3 4 -Conjecture 1 Michael A. Henning and 2 Douglas F. Rall 1 Department of Pure and Applied Mathematics University of Johannesburg Auckland Park, 2006 South Africa
More informationThe Genetic Algorithm for finding the maxima of single-variable functions
Research Inventy: International Journal Of Engineering And Science Vol.4, Issue 3(March 2014), PP 46-54 Issn (e): 2278-4721, Issn (p):2319-6483, www.researchinventy.com The Genetic Algorithm for finding
More informationAn Improved Upper Bound for the Sum-free Subset Constant
1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 13 (2010), Article 10.8.3 An Improved Upper Bound for the Sum-free Subset Constant Mark Lewko Department of Mathematics University of Texas at Austin
More informationThe effect of server s breakdown on the performance of finite-source retrial queueing systems
6 th International Conference on Applied Informatics Eger, Hungary, January 27 31, 2004. The effect of server s breakdown on the performance of finite-source retrial queueing systems János Roszik, János
More informationADAPTIVE SORTING WITH AVL TREES
ADAPTIVE SORTING WITH AVL TREES Amr Elmasry Computer Science Department Alexandria University Alexandria, Egypt elmasry@alexeng.edu.eg Abstract A new adaptive sorting algorithm is introduced. The new implementation
More informationA NOTE ON THE NUMBER OF DOMINATING SETS OF A GRAPH
A NOTE ON THE NUMBER OF DOMINATING SETS OF A GRAPH STEPHAN WAGNER Abstract. In a recent article by Bród and Skupień, sharp upper and lower bounds for the number of dominating sets in a tree were determined.
More informationThe Dynamic Hungarian Algorithm for the Assignment Problem with Changing Costs
The Dynamic Hungarian Algorithm for the Assignment Problem with Changing Costs G. Ayorkor Mills-Tettey Anthony Stentz M. Bernardine Dias CMU-RI-TR-07-7 July 007 Robotics Institute Carnegie Mellon University
More informationON DECOMPOSITION OF FUZZY BԐ OPEN SETS
ON DECOMPOSITION OF FUZZY BԐ OPEN SETS 1 B. Amudhambigai, 2 K. Saranya 1,2 Department of Mathematics, Sri Sarada College for Women, Salem-636016, Tamilnadu,India email: 1 rbamudha@yahoo.co.in, 2 saranyamath88@gmail.com
More informationSubdivided graphs have linear Ramsey numbers
Subdivided graphs have linear Ramsey numbers Noga Alon Bellcore, Morristown, NJ 07960, USA and Department of Mathematics Raymond and Beverly Sackler Faculty of Exact Sciences Tel Aviv University, Tel Aviv,
More informationSymmetric Product Graphs
Rochester Institute of Technology RIT Scholar Works Theses Thesis/Dissertation Collections 5-20-2015 Symmetric Product Graphs Evan Witz Follow this and additional works at: http://scholarworks.rit.edu/theses
More informationSOFT GENERALIZED CLOSED SETS IN SOFT TOPOLOGICAL SPACES
5 th March 0. Vol. 37 No. 005-0 JATIT & LLS. All rights reserved. ISSN: 99-8645 www.jatit.org E-ISSN: 87-395 SOFT GENERALIZED CLOSED SETS IN SOFT TOPOLOGICAL SPACES K. KANNAN Asstt Prof., Department of
More informationTHE GROWTH DEGREE OF VERTEX REPLACEMENT RULES
THE GROWTH DEGREE OF VERTEX REPLACEMENT RULES JOSEPH P. PREVITE AND MICHELLE PREVITE 1. Introduction. 2. Vertex Replacement Rules. 3. Marked Graphs Definition 3.1. A marked graph (G, p) is a graph with
More informationSome Problems of Fuzzy Modeling of Telecommunications Networks
Some Problems of Fuzzy Modeling of Telecommunications Networks Kirill Garbuzov Novosibirsk State University Department of Mechanics and Mathematics Novosibirsk, Russia, 630090, Email: gartesk@rambler.ru
More information