[SYLWAN., 158(6)]. ISI

Size: px
Start display at page:

Download "[SYLWAN., 158(6)]. ISI"

Transcription

1 The proposl of Improved Inext Isomorphi Grph Algorithm to Detet Design Ptterns Afnn Slem B-Brhem, M. Rizwn Jmeel Qureshi Fulty of Computing nd Informtion Tehnology, King Adulziz University, Jeddh, SAUDI ARABIA e-mil: Astrt Design ptterns eing pplied more nd more to solve the softwre engineering diffiulties in the ojet oriented softwre design proedures. So, the design pttern detetion is widely used y softwre industries. Currently, mny solutions presented to detet the design pttern in the system design. In this pper, we will propose new one whih first; we will use the grph implementtion to implement oth the system design UML digrm nd the design pttern UML digrm. Seond, we will implement the edges for eh one of the oth two grphs in set of 4-tuple elements. Then, we will pply new inext grph isomorphi lgorithm to detet the design pttern in the system design. Key Word: Design Pttern, 4-tuple, UML, Reltionl view, Inext, Grph isomorphism. 1. Introdution Design ptterns re desriptions of the equivlent Clsses, whih is the pproprite solution to the reurring prolems in the design. One we implement numer of ptterns when designing system, the relted informtion to the design pttern will not e longer ville. Therefore, it is essentil to detet the design pttern instnes in the system design to understnd the system or mintin it [1-3]. The design ptterns regrded s n expert design experienes. The experts' knowledge is represented in the forml 23 ptterns of GoF. Also, design pttern re onsidered s one of the reuse design tehniques. Then, the softwre industry hve een reused these experienes widely. As result of the presene of relile method to detet the design ptterns from system design, then novies will e suess in the softwre reengineering [4-7]. Mny softwre engineering prolems solved y the grph sed methods. Also, Design ptterns hve proved to e effetive in solving the prolems relted to the system design. to detet the design pttern in the system design using the grph sed pproh we must firstly onvert the UML digrm for oth: design pttern nd the system design into diret grph nd then determine whether the pttern grph exist extly in the system grph or not depend on the lssi onept of grph Isomorphi. Sometimes, we do not need to implement the design pttern ompletely in the system design. In some ses we need to know, how mny times design pttern is ompletely or prtilly existed in the system design [1-7]. In this pper, we proposed new solution to detet the different ses of existene of design pttern in system design. First, we will use the grph implementtion to implement oth the system design UML digrm nd the design pttern UML digrm. Seond, we will implement the edges for eh one of the oth two grphs in set of 4-tuple elements. Susequently, we will pply new inext grph isomorphi lgorithm to detet design pttern in system design. The rest of this pper is orgnized s follow: the relted work will reviewed in setion 2. In setion 3, we will present the prolem definition nd the proposed solution. In setion 4, we will vlidte the proposed solution. Finlly, we will present the onlusion from this pper nd the future work in setion Relted Work [SYLWAN., 158(6)]. ISI Indexed 90

2 This setion will disuss the previous work in deteting the design ptterns. To detet the design ptterns in the system design we will deide if the pttern is exist or not. The first method we tlk out ws proposed y Pnde et l. [1]. The first step of this method is pplying the proposed lgorithm to omposite the model grph to produe numer of deomposed grphs nd then try to pplying isomorphism mehnism to find the mthes etween these deomposed grphs nd the design ptterns. The drwk of this method is not overing ll the 23 ptterns of GoF. It is only exmined the ptterns tht mth to the omposed grph of order 2 or 3 nd the omplexity of this deomposition lgorithm is depend on the numer of nodes (it is O (n3) if the grph hs three nodes). So, omplexity will inresed in the systems with lrge model grph. Some pprohes lso deide tht if the design pttern prtilly exists in the system design. To detet the design ptterns, Gupt et l. [2] used the Normlized ross orreltion (NCC). They strted y writing the reltionship mtries of the reltionship grphs tht extrted from the UML digrm of the system design nd the design pttern. Then, they pply the NCC to disover the degree of similrity etween the two grphs (one for the system design nd the other for the design pttern) for the purpose of deteting the Design ptterns. The disdvntge of this method is, it is time onsuming to lulte eh reltionship mtrix distintly. Gupt et l [3] proposed grph mthing lgorithm sed on the A* lgorithm. The proposed lgorithm divided the mthing proess, 1) etween the design pttern grph (DPG) nd the model grph (MG), 2) etween the design pttern grph (DPG) nd the system grph (SG), into K phses. The vlue of K is depending on the minimum numer of nodes (M) in the two grphs used in mthing. It is seleted from the vlues etween 1 to M. The Prolem with this method, it is effetive only in the se of smll mounts of K vlues. Pnde et l[4] proposed new mthing lgorithm whih extrts the reltionship direted grphs from the UML digrms of system model nd design ptterns. Then they ttempt to disover the existent of design ptterns in the model grph using Depth-Node-Input Tle (DNIT). DNIT rrnges the vrious model grph reltionships nd the design pttern y depth. This method is time onsuming in the proess of reting the DNIT entities for the model grph nd for ll design ptterns grphs. Another pproh used the onept of the Boolen funtion to detet the ptterns. Gupt et l. [5] Offering new method tht detet the design pttern depend on the Boolen funtion. They trnsform the UML digrms of the model grph nd the design pttern into Boolen funtion with SOP form. Then, they detet the existene of the design ptterns y ompring the two Boolen funtions. The drwks of using this method re tht it not onsiders the deteting of design ptterns tht hve reltionship from node to itself suh s the singleton design pttern. Some pprohes identify the numer of design pttern instnes in the system. Pnde et l. [7] ttempted to detet the design ptterns nd its instnes y firstly, onstrut the deision tree using rowolumn elements for ll possile sugrphs djeny mtries of the system design grph. After tht, find the row-olumn elements of the design pttern djeny mtrix. Then, hek the isomorphi y trverse the deision tree to detet the row-olumn elements of tht design pttern. The limittion of this method ppers in the se of onstruting deision tree for lrge system design grph; it used huge numer of permuttions sugrphs nd will produe omplex tree tht onsuming lot of time in the trversl proess. M. Gupt et l. [8], they detet the design pttern y pplying grph mthing lgorithm where the mthing proess desries the stte spe illustrtion. The grph mthing lgorithm identifies the omplete su isomorphism for eh reltionship etween two grphs distintly. Then, they omine these distint outputs to detet the existene of the design ptterns or its lterntives. The mpping proess of this method is time onsuming. Gupt nd Pnde [9] propose new lgorithm to detet the design pttern in the soure ode depend on the sugrph isomorphism reltionl view. They ttempt to find the omplete su isomorphism etween the input grph (system under study) nd the design pttern grph to detet the existene of the design ptterns or its lterntives in the grph of system under study. It is time onsuming when find the mthes for eh reltion individully. Yu et l [10] detet the design ptterns y grph isomorphism etween system design nd the design pttern grph. They strt y identifying ll the ndidte nodes from system grph tht orrespond to the design pttern nodes nd then, selet some of them to rete su-grphs of system grph. Finlly, they find the isomorphi etween the design pttern nd them. This method disovers how muh instne of the design pttern in the system grph. This [SYLWAN., 158(6)]. ISI Indexed 91

3 method represents the reltionship etween lsses in the UML digrm of system model y ssigning weight to edges in the grph representtion, this weight desrie ll the reltionship etween tow verties. So, in lrge systems, it will e time onsuming to identify the reltionship for eh edge nd then lulte its weight. All the prolems of the previous work re summrized in Tle Prolem Sttement nd the proposed Solution Following is the prolem tken up in this pper sed on review of the literture [1-7]. How to detet the existene of the design pttern ompletely or prtilly or non-exist in the system design nd how mny times it exists in the system design? This proposed solution will illustrte the implementtion of the system design nd the design pttern UML digrms into two grphs nd the pplying the proposed lgorithm to detet the ompletely or prtilly existene of the design pttern nd how mny opy of tht pttern in the system digrm UML. 3.1 The implementtion of the system design nd the design pttern UML digrms First, we implement the system design nd the design pttern UML digrms s two direted grphs. System grph (SG) is orresponded to the system design UML digrm nd the design pttern grph (DPG) is orresponded to the design pttern UML digrm. Figures 1 to 5 show the exmple of system design nd design ptterns UML with the orresponding SG nd DPG respetively. Eh one of these two grphs hs set of edges tht represent the reltionships etween tow verties nd the self-loop for vertex. The SE is the set of edges tht implements the SG nd the DPE is the set of edges tht implements the DPG where eh element in the SE nd DPE is 4-tuples (A, B, X, Y).The first 2 elements of the 4-tuples A nd B indite the two verties of the edge. The third element X indites the type of reltionship etween A nd B where, vlue1 indites the Diret Assoition, vlue 2 indites the dependeny nd vlue 3 indites the generliztion reltionship. The forth element of the 4-tuples is Y whih indites y 1 if the self-loop existene (if A equl B) otherwise, it will e 0. The dvntge of dding the self-loop element is to detet the Singleton Design Pttern where this element indites if one vertex elongs to itself to mke reltion. We n simply understnd the SE nd the DPE sets y implementing these edges y tle of 4 olumns to implement A, B, X nd Y nd N row where N indites the numer of edges in the grph. 3.2 The New Algorithm to detet the design pttern in the system design The proposed lgorithm will detet the design pttern depend on find ll the possiility of design pttern existene or prt of it in the system design y ompring the 4-tuples of SE nd DPE to stisfy the vlue of X nd Y. the resulted possiilities must form onneted omponent of the SG. SE nd DPE sets re the Input to the lgorithm. The output is the sttements tht indite if the pttern exists ompletely or prtilly with the numer of how muh opies of it in the system design. The tle Poss ws used to sve ll the possiilities of edges from SE in DPE. The numer of olumns of Poss indites the numer of edges of the DPE where it will e s the DPE if the pttern exists ompletely or less thn DPE if the pttern exists prtilly. The numers of rows of Poss indite the numer of opies tht the design pttern exists ompletely or prtilly. Figure 6 shows the steps of the new lgorithm. The output of the proposed lgorithm is tegorized into one of 3 ses s following susetions: 3.3.1The Design pttern exists in the SG with the numer of times it exists This se will our if the numer of olumns of Poss equl to the numer of edges of the DPE (i.e. it will e equl DPE ). The numer of how muh the pttern ompletely exists in the SG will indite y the numer of rows of Poss. If we implement the new lgorithm on the System design of Figure 1 to detet the Fçde design pttern with presented with Figure 2 then: SE= {(,,1,0),(,,1,0), (,,1,0),(d,,3,0),(e,,3,0),(d,,2,0)} [SYLWAN., 158(6)]. ISI Indexed 92

4 DPE= {(P, Q, 1, 0)} After pplying the lgorithm on the SE nd DPE, the Poss will ontin: (,,1,0) (,,1,0) (,,1,0) Then the output will e: The design pttern ompletely exists in the System design with 3 times. Also, if we implement the new lgorithm on the System design of Figure 1 to detet the Prototype design pttern with presented with Figure 4 then: SE= {(,,1,0),(,,1,0), (,,1,0),(e,,3,0),(d,,2,0)} DPE= {(,,1,0),(,,3,0)} After pplying the lgorithm on the SE nd DPE, the Poss will ontin: (,,1,0) (d,,3,0) (,,1,0) (e,,3,0) (,,1,0) (d,,3,0) Then the output will e: The design pttern ompletely exists in the System design with 3 times. We exlude the 3 rows of Poss: (,,1,0) (e,,3,0) (,,1,0) (d,,3,0) (,,1,0) (e,,3,0) euse the first two rows re not onneted, lso the three rows not stisfy the equlity ondition with the elements of DPE whih is the DPE 4-tuple elements hs the sme node in element 2 () The Design pttern prtilly exists in the SG with the numer of times it exists. This se will our if the numer of olumns of Poss less thn the numer of edges of the DPE (i.e. it will e less thn DPE ) ut not equl zero. The numer of how muh the pttern prtilly exists in the SG will indite y the numer of rows of Poss. If we implement the new lgorithm on the System design of Figure 1 to detet the Composite design pttern with presented with Figure 5 then: SE= {(,,1,0),(,,1,0), (,,1,0),(d,,3,0),(e,,3,0),(d,,2,0)} DPE={(,,1,0),(,,3,0),(,,3,0)} Firstly, with n=3 edge the Poss will empty euse ll the possiility not mthing the equlity ondition with the elements of DPE whih is the DPE 4-tuple elements hs the sme node in element 2 (). Also, the first two possiilities re not onneted. (e,,3,0) (d,,3,0) (,,1,0) (e,,3,0) (d,,3,0) (,,1,0) (e,,3,0) (d,,3,0) (,,1,0) After tht, if we derese n y 1, we will find 7 possiilities: (e,,3,0) (d,,3,0) (d,,3,0) (,,1,0) (d,,3,0) (,,1,0) (d,,3,0) (,,1,0) (e,,3,0) (,,1,0) (e,,3,0) (,,1,0) (e,,3,0) (,,1,0) Then Poss will ontin the 3 rows: (d,,3,0) (,,1,0) (d,,3,0) (,,1,0) (e,,3,0) (,,1,0) The output will e: The design pttern prtilly exists in the System design with 3 times. The rest 4 rows not mthing the equlity ondition with the elements of DPE whih is the DPE 4-tuple elements hs the sme node in element 2 (). [SYLWAN., 158(6)]. ISI Indexed 93

5 3.3.3 The Design pttern dose not exists in the SG. This se will our if Poss is empty (No rows or olumns). Then, the pttern dose not exists in SG. If we implement the new lgorithm on the System design of Figure 1 to detet the Singleton design pttern with presented with Figure 3 then: SE= {(,,1,0),(,,1,0),(,,1,0),(d,,3,0),(e,,3,0),(d,,2,0)} DPE= {(A, A, 1, 1)} After pplying the lgorithm on the SE nd DPE, the Poss will e empty nd then the output will e: the design pttern does not exist in the system design. 4. Vlidtion Of The Proposed Solution To vlidte the new Isomorphi lgorithm we using n online questionnire divided into 4 prts for the gols: 1. The effiieny of the proposed solution: This gol vlidte tht the new Isomorphi grph lgorithm is effiient in deteting the design pttern. 2. The usility of the proposed solution: This gol vlidte tht the new Isomorphi grph lgorithm is esy to use. 3. The understndility of the proposed solution: This gol vlidte tht the new Isomorphi grph lgorithm is esy to understnd. 4. The reliility of the proposed solution: This gol vlidte tht the new Isomorphi grph lgorithm is overing ll the ses out the existene of the design pttern in the system design or not.also, to vlidte tht this new Isomorphi grph lgorithm is le to lulte the numer of times the design pttern existene ompletely or prtilly in the system design. Eh prt onsists of 5 -five level sling questions interrelted to eh other to prove the vlidity of one gol. Liker sle is rnging from 1 to 5 s following: very low effet inditing 1; low effet inditing 2; nominl/verge effet inditing 3; high effet inditing 4; very high effet inditing 5. The dt is nlyzed sttistilly to vlidte the proposed solution. 4.1 Findings This setion will present the findings fter nlyzing the responses to the questions of eh gol individully. Cumultive Sttistil Anlysis of Gol 1 (Effiieny) It is essentil to prove tht the new Isomorphi grph lgorithm is effiient in deteting the design pttern. In order to prove the effiieny of the proposed solution, we must firstly prove the effiieny of su-issues strongly relted nd ffeted the effiieny of the new solution. These issues re: the type of lgorithm whih is n Isomorphi grph Algorithm, the UML digrm implementtion for oth system design nd design pttern s diret grph to represent the reltionl view s pre-step for the new solution, implementtion of edges s set of 4-tuples elements for oth the system grph nd design pttern grph, dding the self-loop to filitte detet the Singleton Design Pttern nd the reltionship indition elements in implementing edges of oth the system grph nd design pttern grph. The responses umultive nlysis results for the gol 1 re summrized in Tle 2 nd Figure 7 whih present the nlysis results for the five questions of gol 1. As we shown from figure 7 nd Tle 2 out the umultive desriptive nlysis of gol 1, it is lerly tht 38.67% of the responses find tht the new Isomorphi lgorithm is high effiient nd 36.67% of them find tht our proposed solution is very high effiient in deteting the design pttern in the system design. But, 0.67% of them find this solution low effiient. Where, 24% find the effiient of this solution is norml. [SYLWAN., 158(6)]. ISI Indexed 94

6 Cumultive Sttistil Anlysis of Gol 2 (Usility) It is essentil to prove tht the new Isomorphi grph lgorithm is usle in deteting the design pttern. In order to prove the usility of the proposed solution, we must firstly prove the usility of suissues strongly relted nd ffeted the usility of the new solution. These issues re the sme with suissues of gol1 tht mentioned previously. The responses umultive nlysis results for the gol 2 re summrized in Tle 3 nd Figure 8 whih present the nlysis results for the five questions of gol 2. As we shown from figure 8 nd Tle 3 out the umultive desriptive nlysis of gol 2, it is lerly tht 44.67% of the responses find tht the new Isomorphi lgorithm is high usle nd 36% of them find tht our proposed solution is very high usle in deteting the design pttern in the system design. Where, 19.33% of them find this solution norml usle. Cumultive Sttistil Anlysis of Gol 3 (Understndility) It is essentil to prove tht the new Isomorphi grph lgorithm is understndle to deteting the design pttern. In order to prove the understndility of the proposed solution, we must firstly prove the understndility of su-issues strongly relted nd ffeted the understndility of the new solution. These issues re the sme with su-issues of oth, gol 1 nd 2 tht mentioned previously. The responses umultive nlysis results for the gol 3 re summrized in Tle 4 nd Figure 9 whih present the nlysis results for the five questions of gol 3. As we shown from figure 9 nd Tle 4 out the umultive desriptive nlysis of gol 3, it is lerly tht 41.33% of the responses find tht the new Isomorphi lgorithm is very high understndle nd 40% of them find tht our proposed solution is high understndle in deteting the design pttern in the system design. Where, 18.67% of them find this solution norml understndle. Cumultive Sttistil Anlysis of Gol 4 (Reliility) It is essentil to prove tht the new Isomorphi grph lgorithm is relile in deteting the design pttern. In order to prove the reliility of the proposed solution, we must firstly prove the reliility of su-issues strongly relted nd ffeted the reliility of the new solution. These issues re differing from su-issues of gol 1, 2 nd 3 tht mentioned previously. These su issues re: the ility of the proposed solution to detet the ompletely nd prtilly existene ses, the non-existene of the design pttern in the system design, nd its ility to lulte the numer of times the design pttern ompletely or prtilly existene in system design. The responses umultive nlysis results for the gol 4 re summrized in Tle 5 nd Figure 10 whih present the nlysis results for the five questions of gol 4. As we shown from Figure 10 nd Tle 5 out the umultive desriptive nlysis of gol 4, it is lerly tht 46% of the responses find tht the new Isomorphi lgorithm is very high relile nd 44.67% of them find tht our proposed solution is high relile in deteting the design pttern in the system design. Where, 9.33% of them find this solution reliility is norml. Cumultive nlysis for ll the gols of the new solution The responses umultive nlysis results for the 4 gols of the proposed solution re summrized in Tle 6 nd figure 11. As we shown from Figure 11 nd Tle 6 out the umultive desriptive nlysis of ll the gols, it is lerly tht 42% of the responses rnk the new Isomorphi lgorithm s high nd 40% of them rnk it s very high sle in deteting the design pttern in the system design.but, 0.17% of them rnk it s low sle while, 9.33% of them rnk this solution s norml sle. 5. Conlusion nd Future Work The uthors of this pper proposed new solution to detet ll the possile ses of exist the design pttern or not in the system design. The grph implementtion ws used to implement oth the system design UML digrm nd the design pttern UML digrm. Then, the edges for eh one of the oth two [SYLWAN., 158(6)]. ISI Indexed 95

7 grphs re implemented s set of 4-tuple elements. Lstly, the new inext grph isomorphi lgorithm ws pplied on the two sets to detet the design pttern in the system design. This solution solved the prolems of the relted work nd detets the exist or non-exist of ll the 23 ptterns of GoF nd lulte how mny times the design pttern exist prtilly or ompletely In the future, the uthors pln to implement the proposed solution progrmmtilly s n open soure tool to detet the design pttern. Referenes [1] A. Pnde, M. Gupt nd A.K. Tripthi, A New Approh for Deteting Design Ptterns y Grph Deomposition nd Grph Isomorphism, in Pro. 3rd Interntionl Conferene IC3, Indi, 2010, pp [2] M. Gupt, A. Pnde, R. Singh Ro, nd A.K Tripthi, "Design Pttern Detetion y normlized ross orreltion," in Pro. IEEE Interntionl Conferene on Methods nd Models in Computer Siene (ICM2CS), Indi, 2010, pp [3] M. Gupt, R. Singh Ro nd A.K. Tripthi, "Design Pttern Detetion using inext grph mthing," in Pro. IEEE Interntionl Conferene on Communition nd Computtionl Intelligene (INCOCCI), Indi, 2010, pp [4] A. Pnde, M. Gupt nd A.K. Tripthi, "DNIT A new pproh for design pttern detetion," in Pro. IEEE Interntionl Conferene on Computer nd Communition Tehnology (ICCCT), Indi, 2010, pp [5] A. Pnde, M. Gupt nd A.K. Tripthi,"Design pttern mining for GIS pplition using grph mthing tehniques," in Pro. 3rd IEEE Interntionl Conferene on Computer Siene nd Informtion Tehnology (ICCSIT), Indi, 2010, pp [6] M. Gupt, A. Pnde nd A.K. Tripthi, Design ptterns detetion using SOP expressions for grphs, ACM SIGSOFT Softwre Engineering Notes, vol. 36, pp. 1-5, Jn [7] A. Pnde, M. Gupt nd A.K. Tripthi, " A Deision Tree Approh for Design Ptterns Detetion y Sugrph Isomorphism, in Pro. Interntionl Conferene ICT 2010, Indi, 2010, pp [8] M. Gupt, R. Singh Ro, A. Pnde nd A.K. Tripthi, Design Pttern Mining Using Stte Spe Representtion of Grph Mthing, in Pro. 1 st Interntionl Conferene on Computer Siene nd Informtion Tehnology CCSIT, Indi, 2011, pp [9] M. Gupt nd A. Pnde, Design Ptterns Mining using Sugrph Isomorphism: Reltionl View, Interntionl Journl of Softwre Engineering nd Its Applitions, vol. 5, pp , Apr [10] Y. Dongjin; J. Ge; W. Wu, "Detetion of design pttern instnes sed on grph isomorphism," in Pro. 4th IEEE Interntionl Conferene on Softwre Engineering nd Servie Siene (ICSESS), Chin, 2013, pp d e d e d e d e Diret Assoition Generliztion Dependeny System Grph UML digrm of the system SE= {(,,1,0),(,,1,0),(,,1,0),(d,,3,0),(e,,3,0),(d,,2,0)} design Figure 1 UML digrm of the system design nd its SG nd SE [SYLWAN., 158(6)]. ISI Indexed 96

8 Fde P Susystem Clsses Design Pttern UML of Fçde Design Grph Pttern DPE= {(P,Q,1,0) } Figure 2 UML digrm of the Fçde design pttern nd its DPG nd DPE Q Diret Assoition A Diret Assoition UML of Singleton Design Pttern Design Pttern Grph DPE={(A,A,1,1)} Figure 3 UML digrm of the Singleton design pttern nd its DPG nd DPE Diret Assoition Generliztion Design Pttern Grph UML of Prototype Design DPE={(,,1,0),(,,3,0)} Pttern Figure 4 UML digrm of the Prototype design pttern nd its DPG nd DPE Diret Assoition Generliztion Design Pttern Grph UML of Composite Design DPE={(,,1,0),(,,3,0),(,,3,0)} Pttern Figure 5 UML digrm of the Composite design pttern nd its DPG nd DPE [SYLWAN., 158(6)]. ISI Indexed 97

9 Input: SE, DPE Output: The existene of Design pttern ompletely or prtilly with the numer of how muh opies of it in the SG or not Steps: n= PGE //n is the numer of DPE elements Poss =0 // the Poss Initil s empty tle WHILE (n 0) DO: Fined ll the possiilities of onneted omponent from SE with n Edges where these edges must stisfy the equlity ondition with the 4 element of eh 4-tuples in DPE If Poss >0 Then EXIT WHILE //the design pttern exist ompletely or prtilly Else n=n-1 // derese the numer of edge of DPE y 1 to find prtilly exists of Design Pttern END WHILE Poss_ olumns _Count= numer of olumns of Poss Poss_ rows _Count= numer of rows of Poss //output If (Poss_ olumns _Count = DPE ) //se1 Then: (Print The design pttern ompletely exists in the System design with + Poss_ rows _Count+ times ) Else If (Poss_ olumns _Count < DPE ) //se2 Then: (Print The design pttern prtilly exists in the System design with + Poss_ rows _Count+ times ) Else If (Poss_ olumns _Count =0 && Poss_ rows _Count=0) //se3 Then: (Print The design pttern does not exist in the System design ) Figure 6 the new lgorithm to detet the design pttern in the system design. Figure 7 Perentge Distriutions for Gol 1 [SYLWAN., 158(6)]. ISI Indexed 98

10 Figure 8 Perentge Distriution for Gol 2 Figure 9 Perentge Distriution for Gol 3 Figure 10 Perentge Distriution for Gol 4 [SYLWAN., 158(6)]. ISI Indexed 99

11 Figure 11 Perentge Distriution for ll Gols Pper Title Tle 1 Summrized relted work prolems Prolems A New Approh for Deteting Design Ptterns y Grph Deomposition nd Grph Isomorphism [1] Design Pttern Detetion y Normlized Cross Correltion [2] Design Pttern Detetion Using Inext Grph Mthing [3] DNIT A New Approh for Design Pttern Detetion [4] Design Pttern Mining for GIS Applition Using Grph Mthing Tehniques [5] Design ptterns detetion using SOP expressions for grphs [6] A Deision Tree Approh for Design Ptterns Detetion y Sugrph Isomorphism [7] Design Pttern Mining Using Stte Spe Representtion of Grph Mthing [8] Design Pttern Mining Using Stte Spe Representtion of Grph Mthing [8] Design Ptterns Mining using Sugrph Isomorphism: Reltionl View [9] Detetion of Design Pttern Instnes Bsed on Grph Isomorphism [10] Not over ll the 23 ptterns of GoF Complex for grph with lrge numer of nodes. time onsuming to lulte eh reltionship mtrix distintly Not effiient when using lrge vlues of K. Time onsuming in onstruting DNIT Cn t use in the sitution tht the system design doesn t hve the pttern. not identify ptterns with self-reltionship for lrge system design grphs: Produe omplex tree Time onsuming The mpping proess is time onsuming Time onsuming when find the mthes for eh reltion individully. Time onsuming to identify the reltionship for eh edge nd then lulte its weight. Not over ll the 23 ptterns of GoF Complex for grph with lrge numer of nodes. Tle 2 the umultive nlysis results for gol 1. Q# Very low Low Nominl/Averge High Very high Totl Q1 0.00% 3.33% 23.33% 36.67% 36.67% % Q2 0.00% 0.00% 16.67% 60.00% 23.33% % Q3 0.00% 0.00% 20.00% 33.33% 46.67% % [SYLWAN., 158(6)]. ISI Indexed 100

12 Q4 0.00% 0.00% 30.00% 30.00% 40.00% % Q5 0.00% 0.00% 30.00% 33.33% 36.67% % Totl Avg. 0.00% 0.67% 24.00% 38.67% 36.67% % Tle 3 the umultive nlysis results for gol 2. Q # Very low Low Nominl/Averge High Very high Totl Q6 0.00% 0.00% 20.00% 53.33% 26.67% % Q7 0.00% 0.00% 16.67% 43.33% 40.00% % Q8 0.00% 0.00% 16.67% 50.00% 33.33% % Q9 0.00% 0.00% 23.33% 23.33% 53.33% % Q % 0.00% 20.00% 53.33% 26.67% % Totl Avg. 0.00% 0.00% 19.33% 44.67% 36.00% % Tle 4 the umultive nlysis results for gol 3. Q # Very low Low Nominl/Averge High Very high Totl Q % 0.00% 16.67% 43.33% 40.00% % Q % 0.00% 13.33% 53.33% 33.33% % Q % 0.00% 16.67% 40.00% 43.33% % Q % 0.00% 20.00% 26.67% 53.33% % Q % 0.00% 26.67% 36.67% 36.67% % Totl Avg. 0.00% 0.00% 18.67% 40.00% 41.33% % Tle 5 the umultive nlysis results for gol 4. Q # Very low Low Nominl/Averge High Very high Totl Q % 0.00% 16.67% 40.00% 43.33% % Q % 0.00% 16.67% 30.00% 53.33% % Q % 0.00% 6.67% 50.00% 43.33% % Q % 0.00% 3.33% 46.67% 50.00% % Q % 0.00% 3.33% 56.67% 40.00% % Totl Avg. 0.00% 0.00% 9.33% 44.67% 46.00% % Tle 6 the umultive nlysis results for ll gols. Q # Very low Low Nominl/Averge High Very high Totl Gol % 3.33% % % % % Gol % 0.00% 96.67% % % % Gol % 0.00% 93.33% % % % Gol % 0.00% 46.67% % % % Totl Avg. 0.00% 0.17% 17.83% 42.00% 40.00% % Authors profiles [SYLWAN., 158(6)]. ISI Indexed 101

13 M. Rizwn Jmeel Qureshi- Assistnt Professor t Fulty of Computing & Informtion Tehnology, King Adulziz University, mjor in CBD nd gile Afnn Slem Brhem- Mster student in IT Deprtment t King Adulziz University, interested in Tehnology Mngement, Computer Networks nd Glol Softwre Engineering. [SYLWAN., 158(6)]. ISI Indexed 102

Lesson 4.4. Euler Circuits and Paths. Explore This

Lesson 4.4. Euler Circuits and Paths. Explore This Lesson 4.4 Euler Ciruits nd Pths Now tht you re fmilir with some of the onepts of grphs nd the wy grphs onvey onnetions nd reltionships, it s time to egin exploring how they n e used to model mny different

More information

[Prakash* et al., 5(8): August, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

[Prakash* et al., 5(8): August, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116 [Prksh* et l 58: ugust 6] ISSN: 77-9655 I Vlue: Impt Ftor: 6 IJESRT INTERNTIONL JOURNL OF ENGINEERING SIENES & RESERH TEHNOLOGY SOME PROPERTIES ND THEOREM ON FUZZY SU-TRIDENT DISTNE Prveen Prksh* M Geeth

More information

CS 241 Week 4 Tutorial Solutions

CS 241 Week 4 Tutorial Solutions CS 4 Week 4 Tutoril Solutions Writing n Assemler, Prt & Regulr Lnguges Prt Winter 8 Assemling instrutions utomtilly. slt $d, $s, $t. Solution: $d, $s, nd $t ll fit in -it signed integers sine they re 5-it

More information

Outline. Motivation Background ARCH. Experiment Additional usages for Input-Depth. Regular Expression Matching DPI over Compressed HTTP

Outline. Motivation Background ARCH. Experiment Additional usages for Input-Depth. Regular Expression Matching DPI over Compressed HTTP ARCH This work ws supported y: The Europen Reserh Counil, The Isreli Centers of Reserh Exellene, The Neptune Consortium, nd Ntionl Siene Foundtion wrd CNS-119748 Outline Motivtion Bkground Regulr Expression

More information

A METHOD FOR CHARACTERIZATION OF THREE-PHASE UNBALANCED DIPS FROM RECORDED VOLTAGE WAVESHAPES

A METHOD FOR CHARACTERIZATION OF THREE-PHASE UNBALANCED DIPS FROM RECORDED VOLTAGE WAVESHAPES A METHOD FOR CHARACTERIZATION OF THREE-PHASE UNBALANCED DIPS FROM RECORDED OLTAGE WAESHAPES M.H.J. Bollen, L.D. Zhng Dept. Eletri Power Engineering Chlmers University of Tehnology, Gothenurg, Sweden Astrt:

More information

Duality in linear interval equations

Duality in linear interval equations Aville online t http://ijim.sriu..ir Int. J. Industril Mthemtis Vol. 1, No. 1 (2009) 41-45 Dulity in liner intervl equtions M. Movhedin, S. Slhshour, S. Hji Ghsemi, S. Khezerloo, M. Khezerloo, S. M. Khorsny

More information

Fault tree conversion to binary decision diagrams

Fault tree conversion to binary decision diagrams Loughorough University Institutionl Repository Fult tree onversion to inry deision digrms This item ws sumitted to Loughorough University's Institutionl Repository y the/n uthor. Cittion: ANDREWS, J.D.

More information

Midterm Exam CSC October 2001

Midterm Exam CSC October 2001 Midterm Exm CSC 173 23 Otoer 2001 Diretions This exm hs 8 questions, severl of whih hve suprts. Eh question indites its point vlue. The totl is 100 points. Questions 5() nd 6() re optionl; they re not

More information

CMPUT101 Introduction to Computing - Summer 2002

CMPUT101 Introduction to Computing - Summer 2002 CMPUT Introdution to Computing - Summer 22 %XLOGLQJ&RPSXWHU&LUFXLWV Chpter 4.4 3XUSRVH We hve looked t so fr how to uild logi gtes from trnsistors. Next we will look t how to uild iruits from logi gtes,

More information

Chapter 9. Greedy Technique. Copyright 2007 Pearson Addison-Wesley. All rights reserved.

Chapter 9. Greedy Technique. Copyright 2007 Pearson Addison-Wesley. All rights reserved. Chpter 9 Greey Tehnique Copyright 2007 Person Aison-Wesley. All rights reserve. Greey Tehnique Construts solution to n optimiztion prolem piee y piee through sequene of hoies tht re: fesile lolly optiml

More information

Introduction to Algebra

Introduction to Algebra INTRODUCTORY ALGEBRA Mini-Leture 1.1 Introdution to Alger Evlute lgeri expressions y sustitution. Trnslte phrses to lgeri expressions. 1. Evlute the expressions when =, =, nd = 6. ) d) 5 10. Trnslte eh

More information

CS553 Lecture Introduction to Data-flow Analysis 1

CS553 Lecture Introduction to Data-flow Analysis 1 ! Ide Introdution to Dt-flow nlysis!lst Time! Implementing Mrk nd Sweep GC!Tody! Control flow grphs! Liveness nlysis! Register llotion CS553 Leture Introdution to Dt-flow Anlysis 1 Dt-flow Anlysis! Dt-flow

More information

Final Exam Review F 06 M 236 Be sure to look over all of your tests, as well as over the activities you did in the activity book

Final Exam Review F 06 M 236 Be sure to look over all of your tests, as well as over the activities you did in the activity book inl xm Review 06 M 236 e sure to loo over ll of your tests, s well s over the tivities you did in the tivity oo 1 1. ind the mesures of the numered ngles nd justify your wor. Line j is prllel to line.

More information

Pattern Matching. Pattern Matching. Pattern Matching. Review of Regular Expressions

Pattern Matching. Pattern Matching. Pattern Matching. Review of Regular Expressions Pttern Mthing Pttern Mthing Some of these leture slides hve een dpted from: lgorithms in C, Roert Sedgewik. Gol. Generlize string serhing to inompletely speified ptterns. pplitions. Test if string or its

More information

Lecture 8: Graph-theoretic problems (again)

Lecture 8: Graph-theoretic problems (again) COMP36111: Advned Algorithms I Leture 8: Grph-theoreti prolems (gin) In Prtt-Hrtmnn Room KB2.38: emil: iprtt@s.mn..uk 2017 18 Reding for this leture: Sipser: Chpter 7. A grph is pir G = (V, E), where V

More information

COMP108 Algorithmic Foundations

COMP108 Algorithmic Foundations Grph Theory Prudene Wong http://www.s.liv..uk/~pwong/tehing/omp108/201617 How to Mesure 4L? 3L 5L 3L ontiner & 5L ontiner (without mrk) infinite supply of wter You n pour wter from one ontiner to nother

More information

Lesson6: Modeling the Web as a graph Unit5: Linear Algebra for graphs

Lesson6: Modeling the Web as a graph Unit5: Linear Algebra for graphs Lesson6: Modeling the We s grph Unit5: Liner Alger for grphs Rene Pikhrdt Introdution to We Siene Prt 2 Emerging We Properties Rene Pikhrdt Institute CC-BY-SA-3. for We Siene nd Tehnologies Modeling the

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

Lecture 13: Graphs I: Breadth First Search

Lecture 13: Graphs I: Breadth First Search Leture 13 Grphs I: BFS 6.006 Fll 2011 Leture 13: Grphs I: Bredth First Serh Leture Overview Applitions of Grph Serh Grph Representtions Bredth-First Serh Rell: Grph G = (V, E) V = set of verties (ritrry

More information

SOFTWARE-BUG LOCALIZATION WITH GRAPH MINING

SOFTWARE-BUG LOCALIZATION WITH GRAPH MINING Chpter 17 SOFTWARE-BUG LOCALIZATION WITH GRAPH MINING Frnk Eihinger Institute for Progrm Strutures nd Dt Orgniztion (IPD) Universit-t Krlsruhe (TH), Germny eihinger@ipd.uk.de Klemens B-ohm Institute for

More information

COSC 6374 Parallel Computation. Dense Matrix Operations

COSC 6374 Parallel Computation. Dense Matrix Operations COSC 6374 Prllel Computtion Dense Mtrix Opertions Edgr Griel Fll Edgr Griel Prllel Computtion Edgr Griel erminology Dense Mtrix: ll elements of the mtrix ontin relevnt vlues ypilly stored s 2-D rry, (e.g.

More information

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

Paradigm 5. Data Structure. Suffix trees. What is a suffix tree? Suffix tree. Simple applications. Simple applications. Algorithms

Paradigm 5. Data Structure. Suffix trees. What is a suffix tree? Suffix tree. Simple applications. Simple applications. Algorithms Prdigm. Dt Struture Known exmples: link tble, hep, Our leture: suffix tree Will involve mortize method tht will be stressed shortly in this ourse Suffix trees Wht is suffix tree? Simple pplitions History

More information

Greedy Algorithm. Algorithm Fall Semester

Greedy Algorithm. Algorithm Fall Semester Greey Algorithm Algorithm 0 Fll Semester Optimiztion prolems An optimiztion prolem is one in whih you wnt to fin, not just solution, ut the est solution A greey lgorithm sometimes works well for optimiztion

More information

Parallelization Optimization of System-Level Specification

Parallelization Optimization of System-Level Specification Prlleliztion Optimiztion of System-Level Speifition Luki i niel. Gjski enter for Emedded omputer Systems University of liforni Irvine, 92697, US {li, gjski} @es.ui.edu strt This pper introdues the prlleliztion

More information

Class Overview. Database Design. Database Design Process. Database Design. Introduction to Data Management CSE 414

Class Overview. Database Design. Database Design Process. Database Design. Introduction to Data Management CSE 414 Introution to Dt Mngement CSE 44 Unit 6: Coneptul Design E/R Digrms Integrity Constrints BCNF Introution to Dt Mngement CSE 44 E/R Digrms ( letures) CSE 44 Autumn 08 Clss Overview Dtse Design Unit : Intro

More information

Can Pythagoras Swim?

Can Pythagoras Swim? Overview Ativity ID: 8939 Mth Conepts Mterils Students will investigte reltionships etween sides of right tringles to understnd the Pythgoren theorem nd then use it to solve prolems. Students will simplify

More information

10.2 Graph Terminology and Special Types of Graphs

10.2 Graph Terminology and Special Types of Graphs 10.2 Grph Terminology n Speil Types of Grphs Definition 1. Two verties u n v in n unirete grph G re lle jent (or neighors) in G iff u n v re enpoints of n ege e of G. Suh n ege e is lle inient with the

More information

An Approach to Filter the Test Data for Killing Multiple Mutants in Different Locations

An Approach to Filter the Test Data for Killing Multiple Mutants in Different Locations Interntionl Journl of Computer Theory nd Engineering, Vol. 5, No. 2, April 2013 An Approh to Filter the Test Dt for Killing Multiple Mutnts in Different Lotions Ngendr Prtp Singh, Rishi Mishr, Silesh Tiwri,

More information

Distance Computation between Non-convex Polyhedra at Short Range Based on Discrete Voronoi Regions

Distance Computation between Non-convex Polyhedra at Short Range Based on Discrete Voronoi Regions Distne Computtion etween Non-onvex Polyhedr t Short Rnge Bsed on Disrete Voronoi Regions Ktsuki Kwhi nd Hiroms Suzuki Deprtment of Preision Mhinery Engineering, The University of Tokyo 7-3-1 Hongo, Bunkyo-ku,

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distriuted Systems Priniples nd Prdigms Christoph Dorn Distriuted Systems Group, Vienn University of Tehnology.dorn@infosys.tuwien..t http://www.infosys.tuwien..t/stff/dorn Slides dpted from Mrten vn Steen,

More information

Width and Bounding Box of Imprecise Points

Width and Bounding Box of Imprecise Points Width nd Bounding Box of Impreise Points Vhideh Keikh Mrten Löffler Ali Mohdes Zhed Rhmti Astrt In this pper we study the following prolem: we re given set L = {l 1,..., l n } of prllel line segments,

More information

Internet Routing. IP Packet Format. IP Fragmentation & Reassembly. Principles of Internet Routing. Computer Networks 9/29/2014.

Internet Routing. IP Packet Format. IP Fragmentation & Reassembly. Principles of Internet Routing. Computer Networks 9/29/2014. omputer Networks 9/29/2014 IP Pket Formt Internet Routing Ki Shen IP protool version numer heder length (words) for qulity of servie mx numer remining hops (deremented t eh router) upper lyer protool to

More information

CS453 INTRODUCTION TO DATAFLOW ANALYSIS

CS453 INTRODUCTION TO DATAFLOW ANALYSIS CS453 INTRODUCTION TO DATAFLOW ANALYSIS CS453 Leture Register llotion using liveness nlysis 1 Introdution to Dt-flow nlysis Lst Time Register llotion for expression trees nd lol nd prm vrs Tody Register

More information

Incremental Design Debugging in a Logic Synthesis Environment

Incremental Design Debugging in a Logic Synthesis Environment Inrementl Design Deugging in Logi Synthesis Environment Andres Veneris Jing Brndon Liu University of Toronto Freesle Semiondutors Dept ECE nd CS High Performne Tools Group Toronto, ON M5S 3G4 Austin, TX

More information

Minimal Memory Abstractions

Minimal Memory Abstractions Miniml Memory Astrtions (As implemented for BioWre Corp ) Nthn Sturtevnt University of Alert GAMES Group Ferury, 7 Tlk Overview Prt I: Building Astrtions Minimizing memory requirements Performnes mesures

More information

Triple/Quadruple Patterning Layout Decomposition via Novel Linear Programming and Iterative Rounding

Triple/Quadruple Patterning Layout Decomposition via Novel Linear Programming and Iterative Rounding Triple/Qudruple Ptterning Lyout Deomposition vi Novel Liner Progrmming nd Itertive Rounding Yio Lin, Xioqing Xu, Bei Yu, Ross Bldik nd Dvid Z. Pn ECE Dept., University of Texs t Austin, Austin, TX USA

More information

12/9/14. CS151 Fall 20124Lecture (almost there) 12/6. Graphs. Seven Bridges of Königsberg. Leonard Euler

12/9/14. CS151 Fall 20124Lecture (almost there) 12/6. Graphs. Seven Bridges of Königsberg. Leonard Euler CS5 Fll 04Leture (lmost there) /6 Seven Bridges of Königserg Grphs Prof. Tny Berger-Wolf Leonrd Euler 707-783 Is it possile to wlk with route tht rosses eh ridge e Seven Bridges of Königserg Forget unimportnt

More information

V = set of vertices (vertex / node) E = set of edges (v, w) (v, w in V)

V = set of vertices (vertex / node) E = set of edges (v, w) (v, w in V) Definitions G = (V, E) V = set of verties (vertex / noe) E = set of eges (v, w) (v, w in V) (v, w) orere => irete grph (igrph) (v, w) non-orere => unirete grph igrph: w is jent to v if there is n ege from

More information

Taming Subgraph Isomorphism for RDF Query Processing

Taming Subgraph Isomorphism for RDF Query Processing Tming Sugrph Isomorphism for RDF Query Proessing Jinh Kim # jinh.kim@orle.om Hyungyu Shin hgshin@dl.posteh..kr Wook-Shin Hn wshn@posteh..kr Sungpk Hong # Hssn Chfi # {sungpk.hong, hssn.hfi}@orle.om POSTECH,

More information

COSC 6374 Parallel Computation. Non-blocking Collective Operations. Edgar Gabriel Fall Overview

COSC 6374 Parallel Computation. Non-blocking Collective Operations. Edgar Gabriel Fall Overview COSC 6374 Prllel Computtion Non-loking Colletive Opertions Edgr Griel Fll 2014 Overview Impt of olletive ommunition opertions Impt of ommunition osts on Speedup Crtesin stenil ommunition All-to-ll ommunition

More information

Chapter 4 Fuzzy Graph and Relation

Chapter 4 Fuzzy Graph and Relation Chpter 4 Fuzzy Grph nd Reltion Grph nd Fuzzy Grph! Grph n G = (V, E) n V : Set of verties(node or element) n E : Set of edges An edge is pir (x, y) of verties in V.! Fuzzy Grph ~ n ( ~ G = V, E) n V :

More information

IMAGE COMPRESSION USING HIRARCHICAL LINEAR POLYNOMIAL CODING

IMAGE COMPRESSION USING HIRARCHICAL LINEAR POLYNOMIAL CODING Rsh Al-Tmimi et l, Interntionl Journl of Computer Siene nd Mobile Computing, Vol.4 Issue.1, Jnury- 015, pg. 11-119 Avilble Online t www.ijsm.om Interntionl Journl of Computer Siene nd Mobile Computing

More information

A decision support system prototype for fuzzy multiple objective optimization

A decision support system prototype for fuzzy multiple objective optimization EUSFLAT - LFA A eision support system prototype for fuzzy multiple ojetive optimiztion Fengjie Wu Jie Lu n Gungqun Zhng Fulty of Informtion Tehnology University of Tehnology Syney Austrli E-mil: {fengjiewjieluzhngg}@it.uts.eu.u

More information

SMALL SIZE EDGE-FED SIERPINSKI CARPET MICROSTRIP PATCH ANTENNAS

SMALL SIZE EDGE-FED SIERPINSKI CARPET MICROSTRIP PATCH ANTENNAS Progress In Eletromgnetis Reserh C, Vol. 3, 195 22, 28 SMALL SIZE EDGE-FED SIERPINSKI CARPET MICROSTRIP PATCH ANTENNAS W.-L. Chen nd G.-M. Wng Rdr Engineering Deprtment Missile Institute of Air Fore Engineering

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

Distributed Systems Principles and Paradigms. Chapter 11: Distributed File Systems

Distributed Systems Principles and Paradigms. Chapter 11: Distributed File Systems Distriuted Systems Priniples nd Prdigms Mrten vn Steen VU Amsterdm, Dept. Computer Siene steen@s.vu.nl Chpter 11: Distriuted File Systems Version: Deemer 10, 2012 2 / 14 Distriuted File Systems Distriuted

More information

Profile Based Sub-Image Search in Image Databases

Profile Based Sub-Image Search in Image Databases Profile Bsed Su-Imge Serh in Imge Dtses Vishwkrm Singh 1, Amuj K. Singh 2 Deprtment of Computer Siene, University of Cliforni, Snt Brr, USA 1 vsingh@s.us.edu, 2 muj@s.us.edu Astrt Su-imge serh with high

More information

UTMC APPLICATION NOTE UT1553B BCRT TO INTERFACE PSEUDO-DUAL-PORT RAM ARCHITECTURE INTRODUCTION ARBITRATION DETAILS DESIGN SELECTIONS

UTMC APPLICATION NOTE UT1553B BCRT TO INTERFACE PSEUDO-DUAL-PORT RAM ARCHITECTURE INTRODUCTION ARBITRATION DETAILS DESIGN SELECTIONS UTMC APPLICATION NOTE UT1553B BCRT TO 80186 INTERFACE INTRODUCTION The UTMC UT1553B BCRT is monolithi CMOS integrte iruit tht provies omprehensive Bus Controller n Remote Terminl funtions for MIL-STD-

More information

Distance vector protocol

Distance vector protocol istne vetor protool Irene Finohi finohi@i.unirom.it Routing Routing protool Gol: etermine goo pth (sequene of routers) thru network from soure to Grph strtion for routing lgorithms: grph noes re routers

More information

McAfee Web Gateway

McAfee Web Gateway Relese Notes Revision C MAfee We Gtewy 7.6.2.11 Contents Aout this relese Enhnement Resolved issues Instlltion instrutions Known issues Additionl informtion Find produt doumenttion Aout this relese This

More information

Tight triangulations: a link between combinatorics and topology

Tight triangulations: a link between combinatorics and topology Tight tringultions: link between ombintoris nd topology Jonthn Spreer Melbourne, August 15, 2016 Topologil mnifolds (Geometri) Topology is study of mnifolds (surfes) up to ontinuous deformtion Complited

More information

Single-Layer Trunk Routing Using 45-Degree Lines within Critical Areas for PCB Routing

Single-Layer Trunk Routing Using 45-Degree Lines within Critical Areas for PCB Routing SASIMI 2010 Proeedings (R3-8) Single-Lyer Trunk Routing Using 45-Degree Lines within Critil Ares for PCB Routing Kyosuke SHINODA Yukihide KOHIRA Atsushi TAKAHASHI Tokyo Institute of Tehnology Dept. of

More information

Journal of Combinatorial Theory, Series A

Journal of Combinatorial Theory, Series A Journl of Comintoril Theory, Series A 0 (0) Contents lists ville t SiVerse SieneDiret Journl of Comintoril Theory, Series A www.elsevier.om/lote/jt Spheril tiling y ongruent pentgons Hongho Go, Nn Shi,

More information

Approximate Joins for Data Centric XML

Approximate Joins for Data Centric XML Approximte Joins for Dt Centri XML Nikolus Augsten 1, Mihel Böhlen 1, Curtis Dyreson, Johnn Gmper 1 1 Fulty of Computer Siene, Free University of Bozen-Bolzno Dominiknerpltz 3, Bozen, Itly {ugsten,oehlen,gmper}@inf.uniz.it

More information

Additional Measurement Algorithms in the Overhauser Magnetometer POS-1

Additional Measurement Algorithms in the Overhauser Magnetometer POS-1 Additionl Mesurement Algorithms in the Overhuser Mgnetometer POS-1 O.V. Denisov, A.Y. Denisov, V.A. Spunov (QM Lortory of Url Stte Tehnil University, Mir 19, Ekterinurg, 620002, Russi) J.L. Rsson (Royl

More information

Efficient Subscription Management in Content-based Networks

Efficient Subscription Management in Content-based Networks Effiient Susription Mngement in Content-sed Networks Rphël Chnd, Psl A. Feler Institut EURECOM 06904 Sophi Antipolis, Frne {hnd feler}@eureom.fr Astrt Content-sed pulish/susrie systems offer onvenient

More information

Error Numbers of the Standard Function Block

Error Numbers of the Standard Function Block A.2.2 Numers of the Stndrd Funtion Blok evlution The result of the logi opertion RLO is set if n error ours while the stndrd funtion lok is eing proessed. This llows you to rnh to your own error evlution

More information

6.045J/18.400J: Automata, Computability and Complexity. Quiz 2: Solutions. Please write your name in the upper corner of each page.

6.045J/18.400J: Automata, Computability and Complexity. Quiz 2: Solutions. Please write your name in the upper corner of each page. 6045J/18400J: Automt, Computbility nd Complexity Mrh 30, 2005 Quiz 2: Solutions Prof Nny Lynh Vinod Vikuntnthn Plese write your nme in the upper orner of eh pge Problem Sore 1 2 3 4 5 6 Totl Q2-1 Problem

More information

CS 340, Fall 2016 Sep 29th Exam 1 Note: in all questions, the special symbol ɛ (epsilon) is used to indicate the empty string.

CS 340, Fall 2016 Sep 29th Exam 1 Note: in all questions, the special symbol ɛ (epsilon) is used to indicate the empty string. CS 340, Fll 2016 Sep 29th Exm 1 Nme: Note: in ll questions, the speil symol ɛ (epsilon) is used to indite the empty string. Question 1. [10 points] Speify regulr expression tht genertes the lnguge over

More information

Photovoltaic Panel Modelling Using a Stochastic Approach in MATLAB &Simulink

Photovoltaic Panel Modelling Using a Stochastic Approach in MATLAB &Simulink hotovolti nel Modelling Using Stohsti Approh in MATLAB &Simulink KAREL ZALATILEK, JAN LEUCHTER eprtment of Eletril Engineering University of efene Kouniov 65, 61 City of Brno CZECH REUBLIC krelzpltilek@unoz,

More information

Step-Voltage Regulator Model Test System

Step-Voltage Regulator Model Test System IEEE PES GENERAL MEETING, JULY 5 Step-Voltge Regultor Model Test System Md Rejwnur Rshid Mojumdr, Pblo Arboley, Senior Member, IEEE nd Cristin González-Morán, Member, IEEE Abstrct In this pper, 4-node

More information

CS 551 Computer Graphics. Hidden Surface Elimination. Z-Buffering. Basic idea: Hidden Surface Removal

CS 551 Computer Graphics. Hidden Surface Elimination. Z-Buffering. Basic idea: Hidden Surface Removal CS 55 Computer Grphis Hidden Surfe Removl Hidden Surfe Elimintion Ojet preision lgorithms: determine whih ojets re in front of others Uses the Pinter s lgorithm drw visile surfes from k (frthest) to front

More information

Geometrical reasoning 1

Geometrical reasoning 1 MODULE 5 Geometril resoning 1 OBJECTIVES This module is for study y n individul teher or group of tehers. It: looks t pprohes to developing pupils visulistion nd geometril resoning skills; onsiders progression

More information

COMPUTATION AND VISUALIZATION OF REACHABLE DISTRIBUTION NETWORK SUBSTATION VOLTAGE

COMPUTATION AND VISUALIZATION OF REACHABLE DISTRIBUTION NETWORK SUBSTATION VOLTAGE 24 th Interntionl Conferene on Eletriity Distriution Glsgow, 12-15 June 2017 Pper 0615 COMPUTATION AND VISUALIZATION OF REACHABLE DISTRIBUTION NETWORK SUBSTATION VOLTAGE Mihel SANKUR Dniel ARNOLD Lun SCHECTOR

More information

COSC 6374 Parallel Computation. Communication Performance Modeling (II) Edgar Gabriel Fall Overview. Impact of communication costs on Speedup

COSC 6374 Parallel Computation. Communication Performance Modeling (II) Edgar Gabriel Fall Overview. Impact of communication costs on Speedup COSC 6374 Prllel Computtion Communition Performne Modeling (II) Edgr Griel Fll 2015 Overview Impt of ommunition osts on Speedup Crtesin stenil ommunition All-to-ll ommunition Impt of olletive ommunition

More information

INTEGRATED WORKFLOW ART DIRECTOR

INTEGRATED WORKFLOW ART DIRECTOR ART DIRECTOR Progrm Resoures INTEGRATED WORKFLOW PROGRAM PLANNING PHASE In this workflow phse proess, you ollorte with the Progrm Mnger, the Projet Mnger, nd the Art Speilist/ Imge Led to updte the resoures

More information

Honors Thesis: Investigating the Algebraic Properties of Cayley Digraphs

Honors Thesis: Investigating the Algebraic Properties of Cayley Digraphs Honors Thesis: Investigting the Algebri Properties of Cyley Digrphs Alexis Byers, Wittenberg University Mthemtis Deprtment April 30, 2014 This pper utilizes Grph Theory to gin insight into the lgebri struture

More information

Agilent G3314AA BioConfirm Software

Agilent G3314AA BioConfirm Software Agilent G3314AA BioConfirm Softwre Quik Strt Guide Use this guide to instll nd get strted with the BioConfirm softwre. Wht is BioConfirm Softwre? Agilent G3314AA BioConfirm Softwre lets you onfirm the

More information

Troubleshooting. Verify the Cisco Prime Collaboration Provisioning Installation (for Advanced or Standard Mode), page

Troubleshooting. Verify the Cisco Prime Collaboration Provisioning Installation (for Advanced or Standard Mode), page Trouleshooting This setion explins the following: Verify the Ciso Prime Collortion Provisioning Instlltion (for Advned or Stndrd Mode), pge 1 Upgrde the Ciso Prime Collortion Provisioning from Smll to

More information

Tracking Hidden Agents Through Shadow Information Spaces

Tracking Hidden Agents Through Shadow Information Spaces Trking Hidden Agents Through Shdow Informtion Spes Jingjin Yu Steven M. LVlle jyu@uiu.edu lvlle@uiu.edu Deprtment of Computer Siene University of Illinois Urn, IL 601 USA Astrt This pper ddresses prolems

More information

Colour-texture analysis of paintings using ICA filter banks

Colour-texture analysis of paintings using ICA filter banks Colour-texture nlysis of pintings using ICA filter nks Nnne vn Noord Nnne@tilurguniversity.edu Tilurg University, Wrndeln 2, 5037 AB Tilurg, The Netherlnds Eri Postm E.O.Postm@tilurguniversity.edu Tilurg

More information

Bayesian Networks: Directed Markov Properties (Cont d) and Markov Equivalent DAGs

Bayesian Networks: Directed Markov Properties (Cont d) and Markov Equivalent DAGs Byesin Networks: Direte Mrkov Properties (Cont ) n Mrkov Equivlent DAGs Huizhen Yu jney.yu@s.helsinki.fi Dept. Computer Siene, Univ. of Helsinki Proilisti Moels, Spring, 2010 Huizhen Yu (U.H.) Byesin Networks:

More information

Image Compression based on Quadtree and Polynomial

Image Compression based on Quadtree and Polynomial Interntionl Journl of Computer Applitions (0975 8887 Imge Compression sed on Qudtree nd Polynomil Ghdh Al-Khfj Ph.D Dept. of Computer Siene, Bghdd University, College of Siene. ABSTRACT In this pper, n

More information

Tool Vendor Perspectives SysML Thus Far

Tool Vendor Perspectives SysML Thus Far Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com

More information

Calculus Differentiation

Calculus Differentiation //007 Clulus Differentition Jeffrey Seguritn person in rowot miles from the nerest point on strit shoreline wishes to reh house 6 miles frther down the shore. The person n row t rte of mi/hr nd wlk t rte

More information

FASTEST METHOD TO FIND ALTERNATIVE RE-ROUTE

FASTEST METHOD TO FIND ALTERNATIVE RE-ROUTE INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 FASTEST METHOD TO FIND ALTERNATIVE RE-ROUTE 1 M.JothiLkshmi, M.S., M.Phil. 2 C.Theeendr, M.S., M.Phil. 3 M.K.Pvithr,

More information

Type Checking. Roadmap (Where are we?) Last lecture Context-sensitive analysis. This lecture Type checking. Symbol tables

Type Checking. Roadmap (Where are we?) Last lecture Context-sensitive analysis. This lecture Type checking. Symbol tables Type Cheking Rodmp (Where re we?) Lst leture Contet-sensitie nlysis Motition Attriute grmmrs Ad ho Synt-direted trnsltion This leture Type heking Type systems Using synt direted trnsltion Symol tles Leil

More information

MITSUBISHI ELECTRIC RESEARCH LABORATORIES Cambridge, Massachusetts. Introduction to Matroids and Applications. Srikumar Ramalingam

MITSUBISHI ELECTRIC RESEARCH LABORATORIES Cambridge, Massachusetts. Introduction to Matroids and Applications. Srikumar Ramalingam Cmrige, Msshusetts Introution to Mtrois n Applitions Srikumr Rmlingm MERL mm//yy Liner Alger (,0,0) (0,,0) Liner inepenene in vetors: v, v2,..., For ll non-trivil we hve s v s v n s, s2,..., s n 2v2...

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

4.3 Balanced Trees. let us assume that we can manipulate them conveniently and see how they can be put together to form trees.

4.3 Balanced Trees. let us assume that we can manipulate them conveniently and see how they can be put together to form trees. 428 T FOU 4.3 Blned Trees T BT GOIT IN T VIOU setion work well for wide vriety of pplitions, ut they hve poor worst-se performne. s we hve noted, files lredy in order, files in reverse order, files with

More information

String comparison by transposition networks

String comparison by transposition networks String omprison y trnsposition networks Alexnder Tiskin (Joint work with Peter Krushe) Deprtment of Computer Siene University of Wrwik http://www.ds.wrwik..uk/~tiskin (inludes n extended version of this

More information

Quadrilateral and Tetrahedral Mesh Stripification Using 2-Factor Partitioning of the Dual Graph

Quadrilateral and Tetrahedral Mesh Stripification Using 2-Factor Partitioning of the Dual Graph The Visul omputer mnusript No. (will e inserted y the editor) Plo Diz-Gutierrez M. Gopi Qudrilterl nd Tetrhedrl Mesh Stripifition Using 2-Ftor Prtitioning of the Dul Grph strt In order to find 2-ftor of

More information

Mixed-Signal Testability Analysis for Data-Converter IPs

Mixed-Signal Testability Analysis for Data-Converter IPs Mixed-Signl Testility Anlysis for Dt-Converter IPs Arldo vn de Krts nd Hns G. Kerkhoff Testle Design nd Testing of Nnosystems Group MESA+ Institute for Nnotehnology 7500AE Enshede, the Netherlnds Emil:

More information

Package Contents. Wireless-G USB Network Adapter with SpeedBooster USB Cable Setup CD-ROM with User Guide (English only) Quick Installation

Package Contents. Wireless-G USB Network Adapter with SpeedBooster USB Cable Setup CD-ROM with User Guide (English only) Quick Installation A Division of Ciso Systems, In. Pkge Contents Wireless-G USB Network Adpter with SpeedBooster USB Cle Setup CD-ROM with User Guide (English only) Quik Instlltion 2,4 GHz 802.11g Wireless Model No. Model

More information

Asymmetric Visual Hierarchy Comparison with Nested Icicle Plots

Asymmetric Visual Hierarchy Comparison with Nested Icicle Plots symmetri Visul Hierrhy Comprison with Nested Iile Plots Fin ek 1, Frnz-Josef Wiszniewsky 2, Mihel urh 1, Stephn Diehl 2, nd Dniel Weiskopf 1 1 VISUS, University of Stuttgrt, Germny 2 University of Trier,

More information

Computational geometry

Computational geometry Leture 23 Computtionl geometry Supplementl reding in CLRS: Chpter 33 exept 33.3 There re mny importnt prolems in whih the reltionships we wish to nlyze hve geometri struture. For exmple, omputtionl geometry

More information

COMPUTER EDUCATION TECHNIQUES, INC. (WEBLOGIC_SVR_ADM ) SA:

COMPUTER EDUCATION TECHNIQUES, INC. (WEBLOGIC_SVR_ADM ) SA: In orer to lern whih questions hve een nswere orretly: 1. Print these pges. 2. Answer the questions. 3. Sen this ssessment with the nswers vi:. FAX to (212) 967-3498. Or. Mil the nswers to the following

More information

Comparison of Global Histogram Methods for 2D and 3D Entropy Based Image Segmentation

Comparison of Global Histogram Methods for 2D and 3D Entropy Based Image Segmentation 9th WSEAS Interntionl Conferene on EVOLUTIONARY COMPUTING (EC 8, Sofi, Bulgri, My 2-4, 28 Comrison of Glol Histogrm Methods for 2D nd 3D Entroy Bsed Imge Segmenttion GEORGI PETROV (, PANAYOT ILIEV (2,

More information

Inter-domain Routing

Inter-domain Routing COMP 631: NETWORKED & DISTRIBUTED SYSTEMS Inter-domin Routing Jsleen Kur Fll 2016 1 Internet-sle Routing: Approhes DV nd link-stte protools do not sle to glol Internet How to mke routing slle? Exploit

More information

Lecture 12 : Topological Spaces

Lecture 12 : Topological Spaces Leture 12 : Topologil Spes 1 Topologil Spes Topology generlizes notion of distne nd loseness et. Definition 1.1. A topology on set X is olletion T of susets of X hving the following properties. 1. nd X

More information

Towards Unifying Advances in Twig Join Algorithms

Towards Unifying Advances in Twig Join Algorithms Pro. 21st Austrlsin Dtse Conferene (ADC 2010), Brisne, Austrli Towrds Unifying Advnes in Twig Join Algorithms Nils Grimsmo Truls A. Bjørklund Deprtment of Computer nd Informtion Siene Norwegin University

More information

A New Method for Solving Intuitionistic Fuzzy. Transportation Problem

A New Method for Solving Intuitionistic Fuzzy. Transportation Problem pplied Mtemtil Sienes, Vol 7,, no 8, 57-65 HKR Ltd, wwwm-ikriom New Metod for Solving ntuitionisti Fuzzy Trnsporttion Prolem Ngoor Gni PG & Reser Deprtment of Mtemtis Jml Momed College uto Tiruirpplli-6,

More information

Topological Queries on Graph-structured XML Data: Models and Implementations

Topological Queries on Graph-structured XML Data: Models and Implementations Topologicl Queries on Grph-structured XML Dt: Models nd Implementtions Hongzhi Wng, Jinzhong Li, nd Jizhou Luo Astrct In mny pplictions, dt is in grph structure, which cn e nturlly represented s grph-structured

More information

Selecting the Most Highly Correlated Pairs within a Large Vocabulary

Selecting the Most Highly Correlated Pairs within a Large Vocabulary Seleting the Most Highl Correlted Pirs within Lrge Voulr Koji Umemur Deprtment of Computer Siene Toohshi Universit of Tehnolog umemur@tutistutjp Astrt Ourene ptterns of words in douments n e epressed s

More information

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών

ΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών ΕΠΛ323 - Θωρία και Πρακτική Μταγλωττιστών Lecture 3 Lexicl Anlysis Elis Athnsopoulos elisthn@cs.ucy.c.cy Recognition of Tokens if expressions nd reltionl opertors if è if then è then else è else relop

More information

UNCORRECTED SAMPLE PAGES. Angle relationships and properties of 6geometrical figures 1. Online resources. What you will learn

UNCORRECTED SAMPLE PAGES. Angle relationships and properties of 6geometrical figures 1. Online resources. What you will learn Online resoures uto-mrked hpter pre-test Video demonstrtions of ll worked exmples Intertive widgets Intertive wlkthroughs Downlodle HOTsheets ess to ll HOTmths ustrlin urriulum ourses ess to the HOTmths

More information

WORKSHOP 9 HEX MESH USING SWEEP VECTOR

WORKSHOP 9 HEX MESH USING SWEEP VECTOR WORKSHOP 9 HEX MESH USING SWEEP VECTOR WS9-1 WS9-2 Prolem Desription This exerise involves importing urve geometry from n IGES file. The urves re use to rete other urves. From the urves trimme surfes re

More information

Robust internal multiple prediction algorithm Zhiming James Wu, Sonika, Bill Dragoset*, WesternGeco

Robust internal multiple prediction algorithm Zhiming James Wu, Sonika, Bill Dragoset*, WesternGeco Roust internl multiple preition lgorithm Zhiming Jmes Wu, Sonik, Bill Drgoset*, WesternGeo Summry Multiple ttenution is n importnt t proessing step for oth mrine n ln t. Tehniques for surfe- rpily in the

More information