Database Replication Algorithm Performance in High Speed Networks Under Load Balancing

Size: px
Start display at page:

Download "Database Replication Algorithm Performance in High Speed Networks Under Load Balancing"

Transcription

1 Database Repication Agorith Perforance in High Speed Networks Under Load Baancing Rekh Nath Singh 1, Raghura Singh 2 1 Research Schoar, A. P. J. Abdu Kaa Technica University, Lucknow, India. 2 Director, K.N.I.T., Sutanpur, Sutanpur, India. Abstract Database repication process aintains obects of database ike tabes, in a nuber of databases that buid a syste of distributed database. The database repication requireents are increasing day by day due to the ore use of internet. To eet such requireents priorities of request can be used. In this work two casses of requests are considered i.e., Low Priority and High Priority. Low priority requests are not so iportant and they can be deayed or drooped over high priority requests. For exape, downoading a song is ow priority requests, whie inforation send by defense appications are high priority requests. The request oss rate can be further reduced using oad baancing conditions where soe of the contending requests sent to soe other nodes, and they reach their destination using soe aternative paths. In view of above aspects perforance evauation of M-PDDRA (Modified Pre-bringing Based Dynaic Data Repication Agorith) is done using coputer siuation. Keywords: Database repiation; database; priorities; oad baancing etc. cabe, with these cabes servers are connected using O/E or E/O conversions as required. The request arriving on these servers ay have priorities, and if request cannot be served, then it wi be dropped. To save the dropping of requests, buffering is perfored at the servers. But if buffer overfows, then it is ost ikey that ow priority requests wi be dropped. To iniize this oss network oad baancing schee can be appied. This paper, investigate the perforance of the agorith, under ow and high priority of requests aong-with oad baancing conditions at various server. INTRODUCTION We coud define the process of Repication of copying and keeping up the obects of database ike tabes, in a nuber of databases that buid a syste of distributed database [1]. We notice and ake storing of these variations that are put into one site prior to sending and are being appied at a the reote positions. This process akes use of technique of distributed database in order to ake sharing of data between nuerous sites, however we can concude that a repicated database and a distributed database are different. If we tak about a distributed database, we can find the data at nuerous positions, sti a specific tabe is avaiabe at ust one position. We are going to ention few typica causes for aking use of repication: This technique gives rapid, oca access to shared data due to the fact that it aintains activity over a nuber of sites. A few users can have the authority to access one server however other ay have the benefit of accessing various servers, hence diinishing the oad at each server. In addition, the repication site with the east expense of access coud be source fro where users can access data. Generay, this is the geographicay nearest site to the [2]. However, in the distributed database servers can be ocated anywhere across the gobe. Nowadays, backbone network runs on fiber optic Figure 1: Scheatic of a four-hosts custer a singe virtua server to hande network traffic. We get great accessibiity and versatiity to enterprise-wide TCP/IP services by Network Load Baancing. These services ay be streaing edia, proxy, Web, Terina Services, Virtua Private Networking (VPN) services. IP traffic is distributed to nuerous copies of a TCP/IP service by Network Load Baancing ike a Web server, a going on a host inside the custer. Network Load Baancing straightforwardy segents the requests of the cient aong the hosts and gives the cients a chance to get to the custer by aking use of at east one or ore "virtua" IP addresses. If we consider the cient's perspective, the cient find custer to 3475

2 be a soitary server that gives responses to these requests ade by cients. With the enhanceent in the enterprise traffic, network adinistrators coud ust connect an extra server into the custer. For instance, as shown in the Figure 1, the custered hosts operator with one another with the purpose to serve traffic of the network fro the Internet. A copy of an IP-based service ike Internet Inforation Services 5.0 (IIS) is run by each server, and networking workoad is distributed by Network Load Baancing aong the. This pace up ordinary processing in the anner that cient of Internet can observe speedier turnaround in regards to their requests. For incuded fraework accessibiity, the appication at the back-end (suppose a database) ay work on a two-node custer going on Custer service. In coparison to the other software soutions, Network Load Baancing gives better resuts. For exape, round robin DNS (RRDNS), akes the distribution of workoad aong a nuber of different servers however it is not abe to give a echanis for the avaiabiity of server. In the event of a server faiure, RRDNS, not in the way ike Network Load Baancing, wi carry on to transfer it work ti the faiure is observed by a network adinistrator and eiinates the particuar server fro the DNS address ist. This is in turn, brings in service interruption for cients. We have soe benefits of Network Load Baancing over soe other options for oad baancing on the basis of both hardware- and software that present singe faiure points or execution hindrances by aking use of a centraized dispatcher. Since Network Load Baancing got no restrictive hardware necessities, we can use any proper coputer. This gives noteworthy cost reserve funds when contrasted with excusive equipent oad baancing soutions. RELATED WORKS A PDDRA (Pre-bringing Based Dynaic Data Repication Agorith) is exhibited in [7]. The principe thought is to preget a few inforation utiizing the heuristic agorith prior to the rea repication begin to essen atency. In earier research, adustents in PDDRA (M-PDDRA) are recoended to ake the further reduction in atency. In yadav et. a. odified the PDDRA schee and aso estabish connections aong RS (regiona servers) for sharing inforation, this aow oca searching of the required inforation [8-11]. For ore detai Pease aude to [7] for further detais. The fundaenta purposes of the agorith are outined as beow: 1. We consider the internet coud in M-PDDRA technique as aster node due to the fact that there is avaiabiity of data in the internet for the repication (Figure 2) Figure 2: Scheatic of the PDDRA schee 2. In the case a node deveops any repication request then it wi get ooked for in oca network through edge node, and further a siutaneous request wi be transitted to the goba network. 3. It is possibe that we ay not have the avaiabiity of data at any oca node or we have a arge waiting tie is too arge, due to the reason that siutaneous request is transitted to both to a oca node as we as a aster node, in the event of aster node access is in queue for suppose tie t q then we can ake the oca search for tie t s < t q. The above discussed siutaneous requests to both goba and oca network wi ake the reduction in atency as copared to the initia request send to oca network and after that to goba network. SIMULATION AND RESULTS We carry out the siuation in MATLAB. The siuator is based on a rando event generator and popuary tered as Monte Caro siuation. In the siuation rando traffic ode is considered. This ode is not copex; and even then it gives decent insight about the repication process. This ode considers that the request can be originated fro any of one the cient with probabiity ρ and each generated request is equay ikey to be served by any of the N servers with probabiity 1/N. Therefore, probabiity that requests arrive for a specific server in any tie sot is [12] N! Pr( ) 1 for! N! N N N 0 N, (1) Let Q 1, Q 2,.., Q q denote the ratio type-1,type-2,, type-q requests to the tota nuber of requests; q i1 Q 1.where q is the priority types ( 1 is the highest, q is the owest). i 3476

3 Probabiity that n 1 type-1, n 2 type-2,... n q type-q requests arrive at the server in sae tie sot can be foruated as: ( n )! n1 nq n Pr( ( )...( ) ) 1,,..., n q 1 P K ( n!) b Q Q The requests wi ony be generated at the sot boundary ony. Most of the systes have oad in range of 0.4 to 0.8. Systes having oad 1 wi aways be saturated and in genera it is ipractica. If requests is generated then it wi randoy assigned a server fro the avaiabe servers which can serve the request. However, if ore than one server can serve the request than server seection is done randoy. However, if oad baancing schee is epoyed, then request wi be assign a server with esser request to serve. Again if sae nuber of requests is eft to be served then any one of the avaiabe server is randoy assigned. This paper adds one ore paraeter on the request generation, i.e., the priority. In this echanis each generated request carries priority. We considered two type of priority; high and ow. High priority requests are served first over ow priority requests. If request is generated on the given oad then high priority requests are serve first over ow priority requests. If arriving request can be served instanty, then it wi be paced in the buffer and ater on it wi be retrieved fro the buffer and served. The nuber of requests that can be buffered wi depends on the buffer capacity of the server. If arriving request cannot be served at the server then it wi be drooped and a negative acknowedgeent (Server in not found/ pease try again) is send back to the sender and sender again regenerate request after a few ore tie sots. To avoid oss of arger nuber of requests a hard oad baancing schee which restrict the nuber of request that can be send to particuar server, whie other eftover requests are send to other servers is epoyed. Requests are fied in the buffer using rues defined under: A. Rues for fiing Buffer 1. For each arriving request first buffer is checked, if buffer is epty, then request wi be served instantaneousy. 2. If buffer is not epty, then priorities of the buffered wi be checked and one high priority request eaves the buffer in FIFO anner, and incoing request wi be buffered using rue 5 3. If in the buffer ony ow priority requests are stored and arriving request aso has ow priority then it wi be buffered using rue If in the buffer ony ow priority requests are stored and arriving request has high priority then it wi be served. 5. The nuber of requests in the buffer shoud be esser or equa to buffer capacity. 6. In above schee ow priority request ay reain in the buffer for very ong duration, to avoid this after a (2) fix tie sots a ow priority request eave the buffer. This tie sot is chosen randoy depending on buffer capacity. 7. To avoid overfow of buffer a hard oad baancing schee is epoyed at each server which restricts the nuber of requests that need to be served by particuar server. B. Resuts and Discussions Request Loss probabiity: It coud be defined as the voue of data that cannot fow via a network, or ese we can define it as the fraction of the generated requests which are not served by any one of the server. Network Load: We can define network oad as the easure of data (traffic) is fowing through the network. In the siuation two types of request requests ow and high is considered. In figures 3 and 4 egends TRL, HPR and LPR are stand for tota request oss, high priority request oss and ow priority request oss respectivey. The nubers of cients/servers (N) are considered to be 4. Figure 3: Request oss probabiity vs. oad for Low priority 0.2 under buffer 4 Figure 4: Request oss probabiity vs. oad for Low priority 0.6 under buffer

4 Figure 3 shows the request oss probabiity vs. Load. In our work we have not shown throughput vs. oad pot because ow request oss rate. Moreover throughput is equa to 1- request oss probabiity. Therefore, both the graph can be used as they ead to sae concusions. In the request generated 4 cients are considered and servers are aso considered to be 4. The perforance ow priority requests is shown with diaond arker, for high priority requests is shown by square arker whie tota request oss which incude the oss of both high and ow priority requests is shown with circe arker. Out of the tota generated requests 20% are of ow priority whie eft over 80% are high priority requests. At the oad of 0.4, the request oss probabiity for high priority requests is , for ow priority requests it is which is neary equa to the tota oss it is evident fro the figure that the request oss rate of high priority requests is uch ess than that of ow priority requests. Figure 4 shows the request oss probabiity vs. Load. Out of the tota generated requests 60% are of ow priority whie rest 40% are high priority requests. Considering the request oss probabiity at the oad of 0.8, for HPR is , for LPR and TRL is Here it is cear fro the figure that ti oad 0.8, HPR oss is zero and ony ow priority requests are ost. Coparing figures 3 and 4, it is cear that ow priority packets are ost first, and as their proportion in tota requests increases, their oss aso increases. However, the perforance of HPR iproves significanty. Load Baancing The oad on a particuar node can be reduced by defecting the soe of the arriving packets. The nuber of packets arriving for a particuar output can be expressed as N N! E[ ] 1. (3)! N! N N 0 N Now, g is the fraction of packets that are defected that effective oad is e N 0 N! (1 g ) 1! N! N N N N. (4) In core nodes once packets arrive then decision regarding defection is perfored, therefore above equation can be sipified to (1 g) (5) e Figure 5: N = 4, B = 4, Low priority 0.2, oad baancing factor 0.1 Figure 5 shows the request oss probabiity vs. Load. Out of the tota generated requests 20% are of ow priority whie rest 80% are high priority requests and out of generated requests 10% requests foows soe aternative path to reach to the server. Coparing the resuts at the oad of 0.8, the request oss probabiity (HPRL) for high priority requests is , for ow priority (LPRL) requests it is whie the tota oss (TRL) is Figure 6 shows the request oss probabiity vs. Load. Out of the tota generated requests 25% are of ow priority whie rest 75% are high priority requests and out of generated requests 25% requests are directed towards the output through soe aternative path. Initiay beow 0.6 oad, a significant difference is observed between high and ow priority requests oss. Coparing the resuts at the oad of 0.8, the request oss probabiity for high priority requests is , for ow priority requests it is whie the tota oss is Figure 7 shows the request oss probabiity vs. Load. Out of the tota generated requests 50% are of ow priority whie rest 50% are high priority requests and out of generated requests 25% requests are directed towards the output through soe aternative routes. Coparing the resuts at the oad of 0.8, the request oss probabiity for high priority requests is , for ow priority requests it is whie the tota oss is In the figure 3.7 at the oad of 0.8, the request oss probabiity for high priority requests is for ow priority requests it is Thus it is evident fro the figures oad baancing reduces the request oss probabiity. 3478

5 Figure 6: N = 4, B = 4, Low priority 0.25, oad baancing factor 0.25 Figure 8: Bar graph for request oss for different proportion of high priority requests Figure 9: Bar graph for request oss for different buffering conditions Figure 7: N = 4, B = 4, Low priority 0.25, oad baancing factor 0.5 It is cear fro Figs 5 to 7 that as the oad baancing factor increases the request oss probabiity decreases. However, due to the high priority of soe requests they get upper hand over other requests, therefore iproveent for high priority requests is ore. As the nuber of ow and high priorities requests affects the tota oss, therefore for cear observation various types of requests osses are obtained for this Monte Caro siuation is perfored for iterations whie keeping oad to a fixed vaue of 0.6 for different proportion of high priority packets. The obtained resuts are shown in Figure 8. Here, for higher proportion of high priority requests, in tota oss both high and ow priority request contributes. Whie for oderate vaue of high priority requests in tota oss aor contribution is due to ow priority requests. For ower proportion of high priority requests, in tota oss is due to the ow priority requests ony. As discussed above, different proportions of high and ow priorities can change the proportion of the oss of different types of requests, but over-a oss cannot be reduced. The over-a oss can be reduced by using ore buffers as shown in Figure 9. In this figure proportion of ow priority request is taken to be 0.2.By increasing the buffer for 4 to 6 and then fro 6 to 8, the request oss reduces by a factor of ore than 10. However, the quaity of service is aintained, and oss of high priority requests is owest and by increasing buffer and using oad baancing can be brig down to a negigiby sa vaue. 3479

6 Load Baancing Figure 10: Scheatic of n nodes network On a particuar node i the arriving oad is the su of the partia oad arriving fro various inks (Figure 10) and can be written as n 1, under the condition 0 1 and where is the nuber of nodes directy connected to node i and n is the tota nuber of nodes in the network. Eqn 6, provides the iniu vaue of fraction of oad that needs to be defected on node i for oad baancing to be effective. Whie ρ denotes the oad arriving for ink towards node i and it considered to be rando between 0 and 1. The siuation resuts for two networks are detaied in Figure 10. In high speed optica networks, the nubers of core nodes are ess than 20, whie in current eectronic networks nuber of core nodes can grow up-to to iions on nodes. In two networks 10 and 100 nodes are considered which can be considered as representation of optica and eectronic networks. The resuts for 10 nodes network is shown in Figure 10, whie for a genera eectronic networks of 100 nodes is shown in Figure 11. As shown in figure 10, the iniu vaue of oad defection factor is high with esser nuber of nodes and as the nuber of nodes increases the vaue of oad defection factor reduces. For exape in a 4 node network iniu vaue for oad defection is whie for 10 nodes it becoes in case of arge node network, oad defection factor reduces to zero if nuber of nodes are greater than 80. Therefore resuts presented in figures 3-9 are appicabe for arge node networks. However, with esser nuber of nodes soe corrections need to be done in packet oss resuts. g (6) eff i 1 1 where g i denotes the fraction of oad which is being defected. In addition to this other nodes which are directy connected to node i can aso defect their data to node i. Therefore effective oad shoud be written as g g p eff i If inks are chosen unifory then we have, g eff gi w. (7) Figure 11: Load baancing factor vs. nuber of input/output inks (10). Where, w denotes the nuber of input/outgoing inks to a particuar node. The oad baancing is effective when g g i 1 1 w 0 Therefore, g i 1 1 g w. (6) Figure 12: Load baancing factor vs. nuber of input/output inks (100). 3480

7 particuar server. Further, it is shown that in high speed networks, oad baancing echanis is affected by both outgoing and incoing traffics, and oad baancing at particuar node is aso affected by oad baancing of other nodes. Figure 13: Request oss probabiity vs. oad under oad baancing factor (0.5) expected and actua oss. Figure 14: Request oss probabiity vs. oad under oad baancing factor (0.2) expected and actua oss. In figure 13, request oss probabiity vs. oad is potted, under oad baancing factor of 0.5, here expected oss is uch esser in coparison to actua oss, and obtained difference is significant. Here, expected oss is obtained using eqn. 6, whie actua oss is obtained using eqn. 7. At the oad of 0.6, the expected request oss probabiity is whie actua oss probabiity is In figure 14, request oss probabiity vs. oad is potted, under oad baancing factor of 0.2, here again expected oss is uch esser in coparison to actua oss, and obtained difference is ess significant. At the oad of 0.6, the expected request oss probabiity is whie actua oss probabiity is CONCLUSIONS In this paper, perforance evauation of per-fetching repication agorith is done. The perforance evauation is done under prioritized traffic whie considering oad baancing schee. In the resuts it has been found that, using buffering, high priority requests can be served with neary 100 percent efficiency. However, at higher oads (>0.8) for ow priority requests throughput is sighty esser. To keep oss of high and ow priority requests to a very ow eve, we have aso adopted a hard oad baancing echanis, which reduces the oad on a REFERENCES [1] B. Kee and G. Aonso, Database repication: a tae of research across counities, Proceedings of the Internationa Conference on VLDB Endowent. Switzerand), Vo. 3, No. 1, pp.5-12, [2] A. Yair, D. Caudiu, M.A. Micha, S. Jonathan and T. Ciprian, Practica wide-area database repication. Technica report, Johns Hopkins University, [3] Y. Chen, D. Berry and P. Dantressange, Transaction based grid database repication, Proceedings of UK e-science. Edinburgh, U.K. pp , [4] A. Correia, L. Rodrigues, N. Carvaho, R. Viaça, R. Oiveira and S. Guedes, GORDA: An open architecture for database repication Proceedings of Sixth Internationa Syposiu on Network Coputing and Appications. Boston, USA, pp , [5] S. Goe, R. Buyya, Data repication strategies in wide area distributed systes, Enterprise service coputing: fro concept to depoyent, pp , [6] A. Thoson, T. Diaond, S. C. Weng, K. Ren, P. Shao and D. J. Abadi, Cavin: fast distributed transactions for partitioned database, Proceedings of the ACM SIGMOD Internationa Conference on Manageent of Data. Scottsdae, Arizona, USA, pp. 1-12, [7] N. Saadat and A.M. Rahani, PDDRA: A new prefetching based dynaic data repication agorith in data grids, Springer: Future Generation Coputer Systes, Vo.28, pp , [8] S.K. Yadav, G. Singh and D. S. Yadav, Matheatica fraework for a nove database repication agorith, Internationa ourna of ModernEducation & Coputer Science, Vo.5, No. 9, pp.1-10, [9] S.K. Yadav, G. Singh and D. S. Yadav, Anaysis of database repication agorith in oca and goba networks, Internationa ourna of Coputer Appications, Vo.84, No. 6, pp.48-54, [10] S.K. Yadav, G. Singh and D. S. Yadav, Throughput and deay anaysis of database repication agorith, Internationa ourna of ModernEducation & Coputer Science, Vo.5, No. 12, pp.47-53, [11] S.K. Yadav, G. Singh and D. S. Yadav, Anaysis of a database repication agorith under oad sharing in networks,, Journa of engineering Science and 3481

8 Technoogy (JESTEC),, Vo.11, No. 2, pp , [12] R. J. Mishra, and A. Jain, Perforance of Data Repication Agorith in Loca and Goba Networks under Different Buffering Conditions, Internationa ourna of ModernEducation & Coputer Science, Vo.7, No. 9, pp.34-41,

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

A NEW METHOD FOR OPTIMAL LOCATION OF FACTS CONTROLLERS USING GENETIC ALGORITHM

A NEW METHOD FOR OPTIMAL LOCATION OF FACTS CONTROLLERS USING GENETIC ALGORITHM Journa of heoretica and Appied Inforation echnoogy 200-2007 JAI. A rights reserved. www.atit.org A NEW MEHOD FOR OPIMAL LOCAION OF FACS CONROLLERS USING GENEIC ALGORIHM 1 K. Vayakuar, 2 Dr. R. P. Kuudinidevi

More information

A Fast Recovery Technique for Multi-Point to Multi-Point MPLS tunnels

A Fast Recovery Technique for Multi-Point to Multi-Point MPLS tunnels M. Chaitou and J. L. Roux / IJECCT 01, Vo. (3) 34 A Fast Recovery Technique for Muti-Point to Muti-Point MPLS tunnes Mohaad Chaitou and Jean-Louis Le RouxOrange Labs avenue Pierre Marzin, 300 Lannion France

More information

Performance Modeling of Database Servers in a Telecommunication Service Management System

Performance Modeling of Database Servers in a Telecommunication Service Management System ICDT : The Seventh Internationa Conference on Digita Teecounications Perforance Modeing of Database Servers in a Teecounication Service Manageent Syste Maria Kih, Paya Aani, Anders Robertsson, Gabriea

More information

Concise Papers. Main Memory Indexing: The Case for BD-Tree 1 INTRODUCTION 3 COST ANALYSIS 2 THE MEMORY-BASED BD-TREE

Concise Papers. Main Memory Indexing: The Case for BD-Tree 1 INTRODUCTION 3 COST ANALYSIS 2 THE MEMORY-BASED BD-TREE 870 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 16, NO. 7, JULY 2004 Concise Papers Main Meory Indexing: The Case for BD-Tree BinCui,BengChinOoi,Meber, IEEE, Jianwen Su, Senior Meber, IEEE,

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

Lines and Angles. introduction

Lines and Angles. introduction 9 Lines and nges intrductin In cass VI, you have earnt soe basic concepts and ters of geoetry point, ine, pane, ine segent, ray, ange and types of anges. In this chapter, we sha earn about soe pairs of

More information

Design of IP Networks with End-to. to- End Performance Guarantees

Design of IP Networks with End-to. to- End Performance Guarantees Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice

More information

A Secure Approach for Caching Contents in Wireless Ad Hoc Networks

A Secure Approach for Caching Contents in Wireless Ad Hoc Networks A Secure Approach for Caching Contents in Wireess Ad Hoc Networks Mohsen Karizadeh Kiskani and Haid R. Sadjadpour Abstract Caching ais to store data ocay in soe nodes within the network to be abe to retrieve

More information

Nearest Neighbor Learning

Nearest Neighbor Learning Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

Modelling and Performance Evaluation of Router Transparent Web cache Mode

Modelling and Performance Evaluation of Router Transparent Web cache Mode Emad Hassan A-Hemiary IJCSET Juy 2012 Vo 2, Issue 7,1316-1320 Modeing and Performance Evauation of Transparent cache Mode Emad Hassan A-Hemiary Network Engineering Department, Coege of Information Engineering,

More information

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing

More information

Extending Graph Rewriting for Refactoring

Extending Graph Rewriting for Refactoring Extending Graph Rewriting for Refactoring Nies Van Eetvede, Dirk Janssens University of Antwerp Departent of oputer science Middeheiaan 1 2020 Antwerpen {nies.vaneetvede dirk.janssens@ua.ac.be Abstract.

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant

More information

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks

Ad Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks

More information

A Petrel Plugin for Surface Modeling

A Petrel Plugin for Surface Modeling A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica

More information

Service Scheduling for General Packet Radio Service Classes

Service Scheduling for General Packet Radio Service Classes Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,

More information

Area Efficient Implementation of Elliptic Curve Point Multiplication Algorithm

Area Efficient Implementation of Elliptic Curve Point Multiplication Algorithm (IJACSA) Internationa Journa of Advanced Coputer Science and Appications, Vo. 6, No., 5 Area Efficient Ipeentation of Eiptic Curve Point Mutipication Agorith Suni Devidas Bobade Research Schoar S.G.B.Aravati

More information

Running Tite: Conict-Free Access of Paths Address for Correspondence: M.C. Pinotti IEI-CNR Via S. Maria, Pisa ITALY E-ai:

Running Tite: Conict-Free Access of Paths Address for Correspondence: M.C. Pinotti IEI-CNR Via S. Maria, Pisa ITALY E-ai: Mappings for Conict-Free Access of Paths in Bidiensiona Arrays, Circuar Lists, and Copete Trees Aan A. Bertossi y and M. Cristina Pinotti Istituto di Eaborazione de' Inforazione Nationa Counci of Research

More information

UnixWare 7 System Administration UnixWare 7 System Configuration

UnixWare 7 System Administration UnixWare 7 System Configuration UnixWare 7 System Administration - CH 3 - UnixWare 7 System Configuration Page 1 of 8 [Figures are not incuded in this sampe chapter] UnixWare 7 System Administration - 3 - UnixWare 7 System Configuration

More information

Readme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT

Readme ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT ORACLE HYPERION PROFITABILITY AND COST MANAGEMENT Reease 11.1.2.4.000 Readme CONTENTS IN BRIEF Purpose... 2 New Features in This Reease... 2 Instaation Information... 2 Supported Patforms... 2 Supported

More information

Quality of Service Evaluations of Multicast Streaming Protocols *

Quality of Service Evaluations of Multicast Streaming Protocols * Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu

More information

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency Deay Budget Partitioning to Maximize Network Resource Usage Efficiency Kartik Gopaan Tzi-cker Chiueh Yow-Jian Lin Forida State University Stony Brook University Tecordia Technoogies kartik@cs.fsu.edu chiueh@cs.sunysb.edu

More information

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing An Adaptive Two-Copy Deayed SR-ARQ for Sateite Channes with Shadowing Jing Zhu, Sumit Roy zhuj@ee.washington.edu Department of Eectrica Engineering, University of Washington Abstract- The paper focuses

More information

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs

Replication of Virtual Network Functions: Optimizing Link Utilization and Resource Costs Repication of Virtua Network Functions: Optimizing Link Utiization and Resource Costs Francisco Carpio, Wogang Bziuk and Admea Jukan Technische Universität Braunschweig, Germany Emai:{f.carpio, w.bziuk,

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

The Big Picture WELCOME TO ESIGNAL

The Big Picture WELCOME TO ESIGNAL 2 The Big Picture HERE S SOME GOOD NEWS. You don t have to be a rocket scientist to harness the power of esigna. That s exciting because we re certain that most of you view your PC and esigna as toos for

More information

Endoscopic Motion Compensation of High Speed Videoendoscopy

Endoscopic Motion Compensation of High Speed Videoendoscopy Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space

Sensitivity Analysis of Hopfield Neural Network in Classifying Natural RGB Color Space Sensitivity Anaysis of Hopfied Neura Network in Cassifying Natura RGB Coor Space Department of Computer Science University of Sharjah UAE rsammouda@sharjah.ac.ae Abstract: - This paper presents a study

More information

Eaton 93PM Remote Monitoring Device. Installation and Operation Manual

Eaton 93PM Remote Monitoring Device. Installation and Operation Manual Eaton 93PM Remote Monitoring Device Instaation and Operation Manua IMPORTANT SAFETY INSTRUCTIONS SAVE THESE INSTRUCTIONS This manua contains important instructions that you shoud foow during instaation

More information

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining

Lecture Notes for Chapter 4 Part III. Introduction to Data Mining Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

TSR: Topology Reduction from Tree to Star Data Grids

TSR: Topology Reduction from Tree to Star Data Grids 03 Seventh Internationa Conference on Innovative Mobie and Internet Services in biquitous Computing TSR: Topoogy Reduction from Tree to Star Data Grids Ming-Chang Lee #, Fang-Yie Leu *, Ying-ping Chen

More information

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah

For Review Only. CFP: Cooperative Fast Protection. Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapolcai and Hussein T. Mouftah Journa of Lightwave Technoogy Page of CFP: Cooperative Fast Protection Bin Wu, Pin-Han Ho, Kwan L. Yeung, János Tapocai and Hussein T. Mouftah Abstract We introduce a nove protection scheme, caed Cooperative

More information

MosaicShape: Stochastic Region Grouping with Shape Prior

MosaicShape: Stochastic Region Grouping with Shape Prior Boston University Coputer Science Technica Report No. 2005-008, Feb. 2005. To appear in Proc. CVPR, 2005. MosaicShape: Stochastic Region Grouping with Shape Prior Jingbin Wang Erdan Gu Margrit Bete Coputer

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

TRANSFORMATIONS AND SYMMETRY

TRANSFORMATIONS AND SYMMETRY TRNSFORMTIONS ND SYMMETRY 1.2.1 1.2.5 Studing transforations of geoetric shapes buids a foundation for a ke idea in geoetr: congruence. In this introduction to transforations, the students epore three

More information

TRANSFORMATIONS AND SYMMETRY

TRANSFORMATIONS AND SYMMETRY 2 Transforations Defense Practice TRNSFORMTIONS ND SYMMETRY 1.2.1 1.2.5 Studing transforations of geoetric shapes buids a foundation for a ke idea in geoetr: congruence. In this introduction to transforations,

More information

Sample of a training manual for a software tool

Sample of a training manual for a software tool Sampe of a training manua for a software too We use FogBugz for tracking bugs discovered in RAPPID. I wrote this manua as a training too for instructing the programmers and engineers in the use of FogBugz.

More information

Split Restoration with Wavelength Conversion in WDM Networks*

Split Restoration with Wavelength Conversion in WDM Networks* Spit Reoration with aveength Conversion in DM Networks* Yuanqiu Luo and Nirwan Ansari Advanced Networking Laborator Department of Eectrica and Computer Engineering New Jerse Initute of Technoog Universit

More information

Meeting Exchange 4.1 Service Pack 2 Release Notes for the S6200/S6800 Servers

Meeting Exchange 4.1 Service Pack 2 Release Notes for the S6200/S6800 Servers Meeting Exchange 4.1 Service Pack 2 Reease Notes for the S6200/S6800 Servers The Meeting Exchange S6200/S6800 Media Servers are SIP-based voice and web conferencing soutions that extend Avaya s conferencing

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

Four Circuit 4 Wire Unit With Dante Network Audio Interface

Four Circuit 4 Wire Unit With Dante Network Audio Interface Network Audio 4 Wire Interface Four Circuit 4 Wire Unit With Dante Network Audio Interface GS-FW012 ip 4 Wire With Dante Interface Highights Four x 4 Wire Circuits Loca Cue Input Dante Network Audio Three

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network

Service Chain (SC) Mapping with Multiple SC Instances in a Wide Area Network Service Chain (SC) Mapping with Mutipe SC Instances in a Wide Area Network This is a preprint eectronic version of the artice submitted to IEEE GobeCom 2017 Abhishek Gupta, Brigitte Jaumard, Massimo Tornatore,

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

NCH Software Express Delegate

NCH Software Express Delegate NCH Software Express Deegate This user guide has been created for use with Express Deegate Version 4.xx NCH Software Technica Support If you have difficuties using Express Deegate pease read the appicabe

More information

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART

AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART 13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of

More information

Automatic Conversion Software for the Safety Verification of Goal-Based Control Programs

Automatic Conversion Software for the Safety Verification of Goal-Based Control Programs Subitted, 2009 Internationa Conference on Software Engineering (ICSE) http://www.cds.catech.edu/~urray/papers/2008t_h09-icse.ht Autoatic Conversion Software for the Safety Verification of Goa-Based Contro

More information

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The

More information

Origami Axioms. O2 Given two marked points P and Q, we can fold a marked line that places P on top of Q.

Origami Axioms. O2 Given two marked points P and Q, we can fold a marked line that places P on top of Q. Origai Axios Given a piece of paper, it is possibe to fod ots of different ines on it. However, ony soe of those ines are constructibe ines, eaning that we can give precise rues for foding the without

More information

Introducing a Target-Based Approach to Rapid Prototyping of ECUs

Introducing a Target-Based Approach to Rapid Prototyping of ECUs Introducing a Target-Based Approach to Rapid Prototyping of ECUs FEBRUARY, 1997 Abstract This paper presents a target-based approach to Rapid Prototyping of Eectronic Contro Units (ECUs). With this approach,

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization QoS-Aware Data Transmission and Wireess Energy Transfer: Performance Modeing and Optimization Dusit Niyato, Ping Wang, Yeow Wai Leong, and Tan Hwee Pink Schoo of Computer Engineering, Nanyang Technoogica

More information

Shape Analysis with Structural Invariant Checkers

Shape Analysis with Structural Invariant Checkers Shape Anaysis with Structura Invariant Checkers Bor-Yuh Evan Chang Xavier Riva George C. Necua University of Caifornia, Berkeey SAS 2007 Exampe: Typestate with shape anaysis Concrete Exampe Abstraction

More information

Confidence in measurement

Confidence in measurement Confidence in measurement Caibration Goba caibration network www.kister.com Tech Center Tech Office Production Center Kister caibration network Acceerometers Data Acquisition (Crash) Whee Force Transducers

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

understood as processors that match AST patterns of the source language and translate them into patterns in the target language.

understood as processors that match AST patterns of the source language and translate them into patterns in the target language. A Basic Compier At a fundamenta eve compiers can be understood as processors that match AST patterns of the source anguage and transate them into patterns in the target anguage. Here we wi ook at a basic

More information

Automatic Grouping for Social Networks CS229 Project Report

Automatic Grouping for Social Networks CS229 Project Report Automatic Grouping for Socia Networks CS229 Project Report Xiaoying Tian Ya Le Yangru Fang Abstract Socia networking sites aow users to manuay categorize their friends, but it is aborious to construct

More information

Archive Software with value add services:

Archive Software with value add services: E-Mai Archive Software with vaue add services: Protect your emais from data oss through reasonabe and secure backup features. Increase the productivity of your team by using the integrated search engine

More information

IBM Research Report. On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overlay Networks

IBM Research Report. On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overlay Networks RC355 (W5-4) February 4, 5 Computer Science IBM Research Report On the Tradeoff among Capacity, Routing Hops, and Being Peer-to-Peer in the Design of Structured Overay Networks Chunqiang Tang, Meissa J.

More information

High Resolution Digital Crane Scale User Instructions

High Resolution Digital Crane Scale User Instructions BCS High Resoution Digita Crane Scae User Instructions AWT 35-501402 Issue AB Breckne is part of Avery Weigh-Tronix. Avery Weigh-Tronix is a trademark of the Iinois Too Works group of companies whose utimate

More information

EE 122 Final Exam - Solution Date: December 14, 2002

EE 122 Final Exam - Solution Date: December 14, 2002 Name: SID: ee ogin: Day/Time of section you atten: EE Fina Exam - Soution Date: December 4, 00 Probem Points /0 /0 3 /0 4 /0 5 /0 6 /0 7 /0 8 /0 9 /0 0 /0 Tota /00 . Question (0 pt) (a) (5 pt) Expain briefy

More information

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method 297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Improving Memory Energy Using Access Pattern Classification

Improving Memory Energy Using Access Pattern Classification Iproving Meory Energy Using Access Pattern Cassification Mahut Kandeir Microsystes Design Lab Pennsyvania State University University Par, PA 16802 andeir@cse.psu.edu Ugur Sezer ECE Departent University

More information

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Server Reease Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Tuxedo Connector Reease 1.0 Document Date: June 29, 2001 Copyright Copyright 2001 BEA Systems, Inc. A Rights Reserved. Restricted

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research

CERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research CERIAS Tech Report 2003-50 Repicated Parae I/O without Additiona Scheduing Costs by Mikhai J. Ataah Center for Education and Research Information Assurance and Security Purdue University, West Lafayette,

More information

Quality Assessment using Tone Mapping Algorithm

Quality Assessment using Tone Mapping Algorithm Quaity Assessment using Tone Mapping Agorithm Nandiki.pushpa atha, Kuriti.Rajendra Prasad Research Schoar, Assistant Professor, Vignan s institute of engineering for women, Visakhapatnam, Andhra Pradesh,

More information

ECE544: Communication Networks-II, Spring Transport Layer Protocols Sumathi Gopal March 31 st 2006

ECE544: Communication Networks-II, Spring Transport Layer Protocols Sumathi Gopal March 31 st 2006 ECE544: Communication Networks-II, Spring 2006 Transport Layer Protocos Sumathi Gopa March 31 st 2006 Lecture Outine Introduction to end-to-end protocos UDP RTP TCP Programming detais 2 End-To-End Protocos

More information

AgreeYa Solutions. Site Administrator for SharePoint User Guide

AgreeYa Solutions. Site Administrator for SharePoint User Guide AgreeYa Soutions Site Administrator for SharePoint 5.2.4 User Guide 2017 2017 AgreeYa Soutions Inc. A rights reserved. This product is protected by U.S. and internationa copyright and inteectua property

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

An Introduction to Design Patterns

An Introduction to Design Patterns An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture

More information

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations

Formulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations Formuation of Loss minimization Probem Using Genetic Agorithm and Line-Fow-based Equations Sharanya Jaganathan, Student Member, IEEE, Arun Sekar, Senior Member, IEEE, and Wenzhong Gao, Senior member, IEEE

More information

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega

ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

Development of a National Portal for Tuvalu. Business Case. SPREP Pacific iclim

Development of a National Portal for Tuvalu. Business Case. SPREP Pacific iclim Deveopment of a Nationa Porta for Tuvau Business Case SPREP Pacific iclim Apri 2018 Tabe of Contents 1. Introduction... 3 1.1 Report Purpose... 3 1.2 Background & Context... 3 1.3 Other IKM Activities

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

User Manual TL-DA18-HD2. 1x8 HDMI 4K Splitter with HDCP 2.2. All Rights Reserved. Version: TL-DA18-HD2_161031

User Manual TL-DA18-HD2. 1x8 HDMI 4K Splitter with HDCP 2.2. All Rights Reserved. Version: TL-DA18-HD2_161031 User Manua TL-DA18-HD2 1x8 HDMI 4K Spitter with HDCP 2.2 A Rights Reserved Version: TL-DA18-HD2_161031 Preface Read this user manua carefuy before using this product. Pictures shown in this manua are for

More information

May 13, Mark Lutz Boulder, Colorado (303) [work] (303) [home]

May 13, Mark Lutz Boulder, Colorado (303) [work] (303) [home] "Using Python": a Book Preview May 13, 1995 Mark Lutz Bouder, Coorado utz@kapre.com (303) 546-8848 [work] (303) 684-9565 [home] Introduction. This paper is a brief overview of the upcoming Python O'Reiy

More information

Peer-Assisted Computation Offloading in Wireless Networks, Student Member, IEEE, and Guohong Cao, Fellow, IEEE

Peer-Assisted Computation Offloading in Wireless Networks, Student Member, IEEE, and Guohong Cao, Fellow, IEEE IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 17, NO. 7, JULY 2018 4565 Peer-Assisted Computation Offoading in Wireess Networks Yei Geng, Student Member, IEEE, and Guohong Cao, Feow, IEEE Abstract

More information

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.

Joint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y. FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four

More information

Functions. 6.1 Modular Programming. 6.2 Defining and Calling Functions. Gaddis: 6.1-5,7-10,13,15-16 and 7.7

Functions. 6.1 Modular Programming. 6.2 Defining and Calling Functions. Gaddis: 6.1-5,7-10,13,15-16 and 7.7 Functions Unit 6 Gaddis: 6.1-5,7-10,13,15-16 and 7.7 CS 1428 Spring 2018 Ji Seaman 6.1 Moduar Programming Moduar programming: breaking a program up into smaer, manageabe components (modues) Function: a

More information