[SYLWAN., 158(6)]. ISI
|
|
- Roy McGee
- 5 years ago
- Views:
Transcription
1 The proposl of Improved Inext Isomorphi Grph Algorithm to Detet Design Ptterns Afnn Slem B-Brhem, M. Rizwn Jmeel Qureshi Fulty of Computing nd Informtion Tehnology, King Adulziz University, Jeddh, SAUDI ARABIA e-mil: Astrt Design ptterns eing pplied more nd more to solve the softwre engineering diffiulties in the ojet oriented softwre design proedures. So, the design pttern detetion is widely used y softwre industries. Currently, mny solutions presented to detet the design pttern in the system design. In this pper, we will propose new one whih first; we will use the grph implementtion to implement oth the system design UML digrm nd the design pttern UML digrm. Seond, we will implement the edges for eh one of the oth two grphs in set of 4-tuple elements. Then, we will pply new inext grph isomorphi lgorithm to detet the design pttern in the system design. Key Word: Design Pttern, 4-tuple, UML, Reltionl view, Inext, Grph isomorphism. 1. Introdution Design ptterns re desriptions of the equivlent Clsses, whih is the pproprite solution to the reurring prolems in the design. One we implement numer of ptterns when designing system, the relted informtion to the design pttern will not e longer ville. Therefore, it is essentil to detet the design pttern instnes in the system design to understnd the system or mintin it [1-3]. The design ptterns regrded s n expert design experienes. The experts' knowledge is represented in the forml 23 ptterns of GoF. Also, design pttern re onsidered s one of the reuse design tehniques. Then, the softwre industry hve een reused these experienes widely. As result of the presene of relile method to detet the design ptterns from system design, then novies will e suess in the softwre reengineering [4-7]. Mny softwre engineering prolems solved y the grph sed methods. Also, Design ptterns hve proved to e effetive in solving the prolems relted to the system design. to detet the design pttern in the system design using the grph sed pproh we must firstly onvert the UML digrm for oth: design pttern nd the system design into diret grph nd then determine whether the pttern grph exist extly in the system grph or not depend on the lssi onept of grph Isomorphi. Sometimes, we do not need to implement the design pttern ompletely in the system design. In some ses we need to know, how mny times design pttern is ompletely or prtilly existed in the system design [1-7]. In this pper, we proposed new solution to detet the different ses of existene of design pttern in system design. First, we will use the grph implementtion to implement oth the system design UML digrm nd the design pttern UML digrm. Seond, we will implement the edges for eh one of the oth two grphs in set of 4-tuple elements. Susequently, we will pply new inext grph isomorphi lgorithm to detet design pttern in system design. The rest of this pper is orgnized s follow: the relted work will reviewed in setion 2. In setion 3, we will present the prolem definition nd the proposed solution. In setion 4, we will vlidte the proposed solution. Finlly, we will present the onlusion from this pper nd the future work in setion Relted Work [SYLWAN., 158(6)]. ISI Indexed 90
2 This setion will disuss the previous work in deteting the design ptterns. To detet the design ptterns in the system design we will deide if the pttern is exist or not. The first method we tlk out ws proposed y Pnde et l. [1]. The first step of this method is pplying the proposed lgorithm to omposite the model grph to produe numer of deomposed grphs nd then try to pplying isomorphism mehnism to find the mthes etween these deomposed grphs nd the design ptterns. The drwk of this method is not overing ll the 23 ptterns of GoF. It is only exmined the ptterns tht mth to the omposed grph of order 2 or 3 nd the omplexity of this deomposition lgorithm is depend on the numer of nodes (it is O (n3) if the grph hs three nodes). So, omplexity will inresed in the systems with lrge model grph. Some pprohes lso deide tht if the design pttern prtilly exists in the system design. To detet the design ptterns, Gupt et l. [2] used the Normlized ross orreltion (NCC). They strted y writing the reltionship mtries of the reltionship grphs tht extrted from the UML digrm of the system design nd the design pttern. Then, they pply the NCC to disover the degree of similrity etween the two grphs (one for the system design nd the other for the design pttern) for the purpose of deteting the Design ptterns. The disdvntge of this method is, it is time onsuming to lulte eh reltionship mtrix distintly. Gupt et l [3] proposed grph mthing lgorithm sed on the A* lgorithm. The proposed lgorithm divided the mthing proess, 1) etween the design pttern grph (DPG) nd the model grph (MG), 2) etween the design pttern grph (DPG) nd the system grph (SG), into K phses. The vlue of K is depending on the minimum numer of nodes (M) in the two grphs used in mthing. It is seleted from the vlues etween 1 to M. The Prolem with this method, it is effetive only in the se of smll mounts of K vlues. Pnde et l[4] proposed new mthing lgorithm whih extrts the reltionship direted grphs from the UML digrms of system model nd design ptterns. Then they ttempt to disover the existent of design ptterns in the model grph using Depth-Node-Input Tle (DNIT). DNIT rrnges the vrious model grph reltionships nd the design pttern y depth. This method is time onsuming in the proess of reting the DNIT entities for the model grph nd for ll design ptterns grphs. Another pproh used the onept of the Boolen funtion to detet the ptterns. Gupt et l. [5] Offering new method tht detet the design pttern depend on the Boolen funtion. They trnsform the UML digrms of the model grph nd the design pttern into Boolen funtion with SOP form. Then, they detet the existene of the design ptterns y ompring the two Boolen funtions. The drwks of using this method re tht it not onsiders the deteting of design ptterns tht hve reltionship from node to itself suh s the singleton design pttern. Some pprohes identify the numer of design pttern instnes in the system. Pnde et l. [7] ttempted to detet the design ptterns nd its instnes y firstly, onstrut the deision tree using rowolumn elements for ll possile sugrphs djeny mtries of the system design grph. After tht, find the row-olumn elements of the design pttern djeny mtrix. Then, hek the isomorphi y trverse the deision tree to detet the row-olumn elements of tht design pttern. The limittion of this method ppers in the se of onstruting deision tree for lrge system design grph; it used huge numer of permuttions sugrphs nd will produe omplex tree tht onsuming lot of time in the trversl proess. M. Gupt et l. [8], they detet the design pttern y pplying grph mthing lgorithm where the mthing proess desries the stte spe illustrtion. The grph mthing lgorithm identifies the omplete su isomorphism for eh reltionship etween two grphs distintly. Then, they omine these distint outputs to detet the existene of the design ptterns or its lterntives. The mpping proess of this method is time onsuming. Gupt nd Pnde [9] propose new lgorithm to detet the design pttern in the soure ode depend on the sugrph isomorphism reltionl view. They ttempt to find the omplete su isomorphism etween the input grph (system under study) nd the design pttern grph to detet the existene of the design ptterns or its lterntives in the grph of system under study. It is time onsuming when find the mthes for eh reltion individully. Yu et l [10] detet the design ptterns y grph isomorphism etween system design nd the design pttern grph. They strt y identifying ll the ndidte nodes from system grph tht orrespond to the design pttern nodes nd then, selet some of them to rete su-grphs of system grph. Finlly, they find the isomorphi etween the design pttern nd them. This method disovers how muh instne of the design pttern in the system grph. This [SYLWAN., 158(6)]. ISI Indexed 91
3 method represents the reltionship etween lsses in the UML digrm of system model y ssigning weight to edges in the grph representtion, this weight desrie ll the reltionship etween tow verties. So, in lrge systems, it will e time onsuming to identify the reltionship for eh edge nd then lulte its weight. All the prolems of the previous work re summrized in Tle Prolem Sttement nd the proposed Solution Following is the prolem tken up in this pper sed on review of the literture [1-7]. How to detet the existene of the design pttern ompletely or prtilly or non-exist in the system design nd how mny times it exists in the system design? This proposed solution will illustrte the implementtion of the system design nd the design pttern UML digrms into two grphs nd the pplying the proposed lgorithm to detet the ompletely or prtilly existene of the design pttern nd how mny opy of tht pttern in the system digrm UML. 3.1 The implementtion of the system design nd the design pttern UML digrms First, we implement the system design nd the design pttern UML digrms s two direted grphs. System grph (SG) is orresponded to the system design UML digrm nd the design pttern grph (DPG) is orresponded to the design pttern UML digrm. Figures 1 to 5 show the exmple of system design nd design ptterns UML with the orresponding SG nd DPG respetively. Eh one of these two grphs hs set of edges tht represent the reltionships etween tow verties nd the self-loop for vertex. The SE is the set of edges tht implements the SG nd the DPE is the set of edges tht implements the DPG where eh element in the SE nd DPE is 4-tuples (A, B, X, Y).The first 2 elements of the 4-tuples A nd B indite the two verties of the edge. The third element X indites the type of reltionship etween A nd B where, vlue1 indites the Diret Assoition, vlue 2 indites the dependeny nd vlue 3 indites the generliztion reltionship. The forth element of the 4-tuples is Y whih indites y 1 if the self-loop existene (if A equl B) otherwise, it will e 0. The dvntge of dding the self-loop element is to detet the Singleton Design Pttern where this element indites if one vertex elongs to itself to mke reltion. We n simply understnd the SE nd the DPE sets y implementing these edges y tle of 4 olumns to implement A, B, X nd Y nd N row where N indites the numer of edges in the grph. 3.2 The New Algorithm to detet the design pttern in the system design The proposed lgorithm will detet the design pttern depend on find ll the possiility of design pttern existene or prt of it in the system design y ompring the 4-tuples of SE nd DPE to stisfy the vlue of X nd Y. the resulted possiilities must form onneted omponent of the SG. SE nd DPE sets re the Input to the lgorithm. The output is the sttements tht indite if the pttern exists ompletely or prtilly with the numer of how muh opies of it in the system design. The tle Poss ws used to sve ll the possiilities of edges from SE in DPE. The numer of olumns of Poss indites the numer of edges of the DPE where it will e s the DPE if the pttern exists ompletely or less thn DPE if the pttern exists prtilly. The numers of rows of Poss indite the numer of opies tht the design pttern exists ompletely or prtilly. Figure 6 shows the steps of the new lgorithm. The output of the proposed lgorithm is tegorized into one of 3 ses s following susetions: 3.3.1The Design pttern exists in the SG with the numer of times it exists This se will our if the numer of olumns of Poss equl to the numer of edges of the DPE (i.e. it will e equl DPE ). The numer of how muh the pttern ompletely exists in the SG will indite y the numer of rows of Poss. If we implement the new lgorithm on the System design of Figure 1 to detet the Fçde design pttern with presented with Figure 2 then: SE= {(,,1,0),(,,1,0), (,,1,0),(d,,3,0),(e,,3,0),(d,,2,0)} [SYLWAN., 158(6)]. ISI Indexed 92
4 DPE= {(P, Q, 1, 0)} After pplying the lgorithm on the SE nd DPE, the Poss will ontin: (,,1,0) (,,1,0) (,,1,0) Then the output will e: The design pttern ompletely exists in the System design with 3 times. Also, if we implement the new lgorithm on the System design of Figure 1 to detet the Prototype design pttern with presented with Figure 4 then: SE= {(,,1,0),(,,1,0), (,,1,0),(e,,3,0),(d,,2,0)} DPE= {(,,1,0),(,,3,0)} After pplying the lgorithm on the SE nd DPE, the Poss will ontin: (,,1,0) (d,,3,0) (,,1,0) (e,,3,0) (,,1,0) (d,,3,0) Then the output will e: The design pttern ompletely exists in the System design with 3 times. We exlude the 3 rows of Poss: (,,1,0) (e,,3,0) (,,1,0) (d,,3,0) (,,1,0) (e,,3,0) euse the first two rows re not onneted, lso the three rows not stisfy the equlity ondition with the elements of DPE whih is the DPE 4-tuple elements hs the sme node in element 2 () The Design pttern prtilly exists in the SG with the numer of times it exists. This se will our if the numer of olumns of Poss less thn the numer of edges of the DPE (i.e. it will e less thn DPE ) ut not equl zero. The numer of how muh the pttern prtilly exists in the SG will indite y the numer of rows of Poss. If we implement the new lgorithm on the System design of Figure 1 to detet the Composite design pttern with presented with Figure 5 then: SE= {(,,1,0),(,,1,0), (,,1,0),(d,,3,0),(e,,3,0),(d,,2,0)} DPE={(,,1,0),(,,3,0),(,,3,0)} Firstly, with n=3 edge the Poss will empty euse ll the possiility not mthing the equlity ondition with the elements of DPE whih is the DPE 4-tuple elements hs the sme node in element 2 (). Also, the first two possiilities re not onneted. (e,,3,0) (d,,3,0) (,,1,0) (e,,3,0) (d,,3,0) (,,1,0) (e,,3,0) (d,,3,0) (,,1,0) After tht, if we derese n y 1, we will find 7 possiilities: (e,,3,0) (d,,3,0) (d,,3,0) (,,1,0) (d,,3,0) (,,1,0) (d,,3,0) (,,1,0) (e,,3,0) (,,1,0) (e,,3,0) (,,1,0) (e,,3,0) (,,1,0) Then Poss will ontin the 3 rows: (d,,3,0) (,,1,0) (d,,3,0) (,,1,0) (e,,3,0) (,,1,0) The output will e: The design pttern prtilly exists in the System design with 3 times. The rest 4 rows not mthing the equlity ondition with the elements of DPE whih is the DPE 4-tuple elements hs the sme node in element 2 (). [SYLWAN., 158(6)]. ISI Indexed 93
5 3.3.3 The Design pttern dose not exists in the SG. This se will our if Poss is empty (No rows or olumns). Then, the pttern dose not exists in SG. If we implement the new lgorithm on the System design of Figure 1 to detet the Singleton design pttern with presented with Figure 3 then: SE= {(,,1,0),(,,1,0),(,,1,0),(d,,3,0),(e,,3,0),(d,,2,0)} DPE= {(A, A, 1, 1)} After pplying the lgorithm on the SE nd DPE, the Poss will e empty nd then the output will e: the design pttern does not exist in the system design. 4. Vlidtion Of The Proposed Solution To vlidte the new Isomorphi lgorithm we using n online questionnire divided into 4 prts for the gols: 1. The effiieny of the proposed solution: This gol vlidte tht the new Isomorphi grph lgorithm is effiient in deteting the design pttern. 2. The usility of the proposed solution: This gol vlidte tht the new Isomorphi grph lgorithm is esy to use. 3. The understndility of the proposed solution: This gol vlidte tht the new Isomorphi grph lgorithm is esy to understnd. 4. The reliility of the proposed solution: This gol vlidte tht the new Isomorphi grph lgorithm is overing ll the ses out the existene of the design pttern in the system design or not.also, to vlidte tht this new Isomorphi grph lgorithm is le to lulte the numer of times the design pttern existene ompletely or prtilly in the system design. Eh prt onsists of 5 -five level sling questions interrelted to eh other to prove the vlidity of one gol. Liker sle is rnging from 1 to 5 s following: very low effet inditing 1; low effet inditing 2; nominl/verge effet inditing 3; high effet inditing 4; very high effet inditing 5. The dt is nlyzed sttistilly to vlidte the proposed solution. 4.1 Findings This setion will present the findings fter nlyzing the responses to the questions of eh gol individully. Cumultive Sttistil Anlysis of Gol 1 (Effiieny) It is essentil to prove tht the new Isomorphi grph lgorithm is effiient in deteting the design pttern. In order to prove the effiieny of the proposed solution, we must firstly prove the effiieny of su-issues strongly relted nd ffeted the effiieny of the new solution. These issues re: the type of lgorithm whih is n Isomorphi grph Algorithm, the UML digrm implementtion for oth system design nd design pttern s diret grph to represent the reltionl view s pre-step for the new solution, implementtion of edges s set of 4-tuples elements for oth the system grph nd design pttern grph, dding the self-loop to filitte detet the Singleton Design Pttern nd the reltionship indition elements in implementing edges of oth the system grph nd design pttern grph. The responses umultive nlysis results for the gol 1 re summrized in Tle 2 nd Figure 7 whih present the nlysis results for the five questions of gol 1. As we shown from figure 7 nd Tle 2 out the umultive desriptive nlysis of gol 1, it is lerly tht 38.67% of the responses find tht the new Isomorphi lgorithm is high effiient nd 36.67% of them find tht our proposed solution is very high effiient in deteting the design pttern in the system design. But, 0.67% of them find this solution low effiient. Where, 24% find the effiient of this solution is norml. [SYLWAN., 158(6)]. ISI Indexed 94
6 Cumultive Sttistil Anlysis of Gol 2 (Usility) It is essentil to prove tht the new Isomorphi grph lgorithm is usle in deteting the design pttern. In order to prove the usility of the proposed solution, we must firstly prove the usility of suissues strongly relted nd ffeted the usility of the new solution. These issues re the sme with suissues of gol1 tht mentioned previously. The responses umultive nlysis results for the gol 2 re summrized in Tle 3 nd Figure 8 whih present the nlysis results for the five questions of gol 2. As we shown from figure 8 nd Tle 3 out the umultive desriptive nlysis of gol 2, it is lerly tht 44.67% of the responses find tht the new Isomorphi lgorithm is high usle nd 36% of them find tht our proposed solution is very high usle in deteting the design pttern in the system design. Where, 19.33% of them find this solution norml usle. Cumultive Sttistil Anlysis of Gol 3 (Understndility) It is essentil to prove tht the new Isomorphi grph lgorithm is understndle to deteting the design pttern. In order to prove the understndility of the proposed solution, we must firstly prove the understndility of su-issues strongly relted nd ffeted the understndility of the new solution. These issues re the sme with su-issues of oth, gol 1 nd 2 tht mentioned previously. The responses umultive nlysis results for the gol 3 re summrized in Tle 4 nd Figure 9 whih present the nlysis results for the five questions of gol 3. As we shown from figure 9 nd Tle 4 out the umultive desriptive nlysis of gol 3, it is lerly tht 41.33% of the responses find tht the new Isomorphi lgorithm is very high understndle nd 40% of them find tht our proposed solution is high understndle in deteting the design pttern in the system design. Where, 18.67% of them find this solution norml understndle. Cumultive Sttistil Anlysis of Gol 4 (Reliility) It is essentil to prove tht the new Isomorphi grph lgorithm is relile in deteting the design pttern. In order to prove the reliility of the proposed solution, we must firstly prove the reliility of su-issues strongly relted nd ffeted the reliility of the new solution. These issues re differing from su-issues of gol 1, 2 nd 3 tht mentioned previously. These su issues re: the ility of the proposed solution to detet the ompletely nd prtilly existene ses, the non-existene of the design pttern in the system design, nd its ility to lulte the numer of times the design pttern ompletely or prtilly existene in system design. The responses umultive nlysis results for the gol 4 re summrized in Tle 5 nd Figure 10 whih present the nlysis results for the five questions of gol 4. As we shown from Figure 10 nd Tle 5 out the umultive desriptive nlysis of gol 4, it is lerly tht 46% of the responses find tht the new Isomorphi lgorithm is very high relile nd 44.67% of them find tht our proposed solution is high relile in deteting the design pttern in the system design. Where, 9.33% of them find this solution reliility is norml. Cumultive nlysis for ll the gols of the new solution The responses umultive nlysis results for the 4 gols of the proposed solution re summrized in Tle 6 nd figure 11. As we shown from Figure 11 nd Tle 6 out the umultive desriptive nlysis of ll the gols, it is lerly tht 42% of the responses rnk the new Isomorphi lgorithm s high nd 40% of them rnk it s very high sle in deteting the design pttern in the system design.but, 0.17% of them rnk it s low sle while, 9.33% of them rnk this solution s norml sle. 5. Conlusion nd Future Work The uthors of this pper proposed new solution to detet ll the possile ses of exist the design pttern or not in the system design. The grph implementtion ws used to implement oth the system design UML digrm nd the design pttern UML digrm. Then, the edges for eh one of the oth two [SYLWAN., 158(6)]. ISI Indexed 95
7 grphs re implemented s set of 4-tuple elements. Lstly, the new inext grph isomorphi lgorithm ws pplied on the two sets to detet the design pttern in the system design. This solution solved the prolems of the relted work nd detets the exist or non-exist of ll the 23 ptterns of GoF nd lulte how mny times the design pttern exist prtilly or ompletely In the future, the uthors pln to implement the proposed solution progrmmtilly s n open soure tool to detet the design pttern. Referenes [1] A. Pnde, M. Gupt nd A.K. Tripthi, A New Approh for Deteting Design Ptterns y Grph Deomposition nd Grph Isomorphism, in Pro. 3rd Interntionl Conferene IC3, Indi, 2010, pp [2] M. Gupt, A. Pnde, R. Singh Ro, nd A.K Tripthi, "Design Pttern Detetion y normlized ross orreltion," in Pro. IEEE Interntionl Conferene on Methods nd Models in Computer Siene (ICM2CS), Indi, 2010, pp [3] M. Gupt, R. Singh Ro nd A.K. Tripthi, "Design Pttern Detetion using inext grph mthing," in Pro. IEEE Interntionl Conferene on Communition nd Computtionl Intelligene (INCOCCI), Indi, 2010, pp [4] A. Pnde, M. Gupt nd A.K. Tripthi, "DNIT A new pproh for design pttern detetion," in Pro. IEEE Interntionl Conferene on Computer nd Communition Tehnology (ICCCT), Indi, 2010, pp [5] A. Pnde, M. Gupt nd A.K. Tripthi,"Design pttern mining for GIS pplition using grph mthing tehniques," in Pro. 3rd IEEE Interntionl Conferene on Computer Siene nd Informtion Tehnology (ICCSIT), Indi, 2010, pp [6] M. Gupt, A. Pnde nd A.K. Tripthi, Design ptterns detetion using SOP expressions for grphs, ACM SIGSOFT Softwre Engineering Notes, vol. 36, pp. 1-5, Jn [7] A. Pnde, M. Gupt nd A.K. Tripthi, " A Deision Tree Approh for Design Ptterns Detetion y Sugrph Isomorphism, in Pro. Interntionl Conferene ICT 2010, Indi, 2010, pp [8] M. Gupt, R. Singh Ro, A. Pnde nd A.K. Tripthi, Design Pttern Mining Using Stte Spe Representtion of Grph Mthing, in Pro. 1 st Interntionl Conferene on Computer Siene nd Informtion Tehnology CCSIT, Indi, 2011, pp [9] M. Gupt nd A. Pnde, Design Ptterns Mining using Sugrph Isomorphism: Reltionl View, Interntionl Journl of Softwre Engineering nd Its Applitions, vol. 5, pp , Apr [10] Y. Dongjin; J. Ge; W. Wu, "Detetion of design pttern instnes sed on grph isomorphism," in Pro. 4th IEEE Interntionl Conferene on Softwre Engineering nd Servie Siene (ICSESS), Chin, 2013, pp d e d e d e d e Diret Assoition Generliztion Dependeny System Grph UML digrm of the system SE= {(,,1,0),(,,1,0),(,,1,0),(d,,3,0),(e,,3,0),(d,,2,0)} design Figure 1 UML digrm of the system design nd its SG nd SE [SYLWAN., 158(6)]. ISI Indexed 96
8 Fde P Susystem Clsses Design Pttern UML of Fçde Design Grph Pttern DPE= {(P,Q,1,0) } Figure 2 UML digrm of the Fçde design pttern nd its DPG nd DPE Q Diret Assoition A Diret Assoition UML of Singleton Design Pttern Design Pttern Grph DPE={(A,A,1,1)} Figure 3 UML digrm of the Singleton design pttern nd its DPG nd DPE Diret Assoition Generliztion Design Pttern Grph UML of Prototype Design DPE={(,,1,0),(,,3,0)} Pttern Figure 4 UML digrm of the Prototype design pttern nd its DPG nd DPE Diret Assoition Generliztion Design Pttern Grph UML of Composite Design DPE={(,,1,0),(,,3,0),(,,3,0)} Pttern Figure 5 UML digrm of the Composite design pttern nd its DPG nd DPE [SYLWAN., 158(6)]. ISI Indexed 97
9 Input: SE, DPE Output: The existene of Design pttern ompletely or prtilly with the numer of how muh opies of it in the SG or not Steps: n= PGE //n is the numer of DPE elements Poss =0 // the Poss Initil s empty tle WHILE (n 0) DO: Fined ll the possiilities of onneted omponent from SE with n Edges where these edges must stisfy the equlity ondition with the 4 element of eh 4-tuples in DPE If Poss >0 Then EXIT WHILE //the design pttern exist ompletely or prtilly Else n=n-1 // derese the numer of edge of DPE y 1 to find prtilly exists of Design Pttern END WHILE Poss_ olumns _Count= numer of olumns of Poss Poss_ rows _Count= numer of rows of Poss //output If (Poss_ olumns _Count = DPE ) //se1 Then: (Print The design pttern ompletely exists in the System design with + Poss_ rows _Count+ times ) Else If (Poss_ olumns _Count < DPE ) //se2 Then: (Print The design pttern prtilly exists in the System design with + Poss_ rows _Count+ times ) Else If (Poss_ olumns _Count =0 && Poss_ rows _Count=0) //se3 Then: (Print The design pttern does not exist in the System design ) Figure 6 the new lgorithm to detet the design pttern in the system design. Figure 7 Perentge Distriutions for Gol 1 [SYLWAN., 158(6)]. ISI Indexed 98
10 Figure 8 Perentge Distriution for Gol 2 Figure 9 Perentge Distriution for Gol 3 Figure 10 Perentge Distriution for Gol 4 [SYLWAN., 158(6)]. ISI Indexed 99
11 Figure 11 Perentge Distriution for ll Gols Pper Title Tle 1 Summrized relted work prolems Prolems A New Approh for Deteting Design Ptterns y Grph Deomposition nd Grph Isomorphism [1] Design Pttern Detetion y Normlized Cross Correltion [2] Design Pttern Detetion Using Inext Grph Mthing [3] DNIT A New Approh for Design Pttern Detetion [4] Design Pttern Mining for GIS Applition Using Grph Mthing Tehniques [5] Design ptterns detetion using SOP expressions for grphs [6] A Deision Tree Approh for Design Ptterns Detetion y Sugrph Isomorphism [7] Design Pttern Mining Using Stte Spe Representtion of Grph Mthing [8] Design Pttern Mining Using Stte Spe Representtion of Grph Mthing [8] Design Ptterns Mining using Sugrph Isomorphism: Reltionl View [9] Detetion of Design Pttern Instnes Bsed on Grph Isomorphism [10] Not over ll the 23 ptterns of GoF Complex for grph with lrge numer of nodes. time onsuming to lulte eh reltionship mtrix distintly Not effiient when using lrge vlues of K. Time onsuming in onstruting DNIT Cn t use in the sitution tht the system design doesn t hve the pttern. not identify ptterns with self-reltionship for lrge system design grphs: Produe omplex tree Time onsuming The mpping proess is time onsuming Time onsuming when find the mthes for eh reltion individully. Time onsuming to identify the reltionship for eh edge nd then lulte its weight. Not over ll the 23 ptterns of GoF Complex for grph with lrge numer of nodes. Tle 2 the umultive nlysis results for gol 1. Q# Very low Low Nominl/Averge High Very high Totl Q1 0.00% 3.33% 23.33% 36.67% 36.67% % Q2 0.00% 0.00% 16.67% 60.00% 23.33% % Q3 0.00% 0.00% 20.00% 33.33% 46.67% % [SYLWAN., 158(6)]. ISI Indexed 100
12 Q4 0.00% 0.00% 30.00% 30.00% 40.00% % Q5 0.00% 0.00% 30.00% 33.33% 36.67% % Totl Avg. 0.00% 0.67% 24.00% 38.67% 36.67% % Tle 3 the umultive nlysis results for gol 2. Q # Very low Low Nominl/Averge High Very high Totl Q6 0.00% 0.00% 20.00% 53.33% 26.67% % Q7 0.00% 0.00% 16.67% 43.33% 40.00% % Q8 0.00% 0.00% 16.67% 50.00% 33.33% % Q9 0.00% 0.00% 23.33% 23.33% 53.33% % Q % 0.00% 20.00% 53.33% 26.67% % Totl Avg. 0.00% 0.00% 19.33% 44.67% 36.00% % Tle 4 the umultive nlysis results for gol 3. Q # Very low Low Nominl/Averge High Very high Totl Q % 0.00% 16.67% 43.33% 40.00% % Q % 0.00% 13.33% 53.33% 33.33% % Q % 0.00% 16.67% 40.00% 43.33% % Q % 0.00% 20.00% 26.67% 53.33% % Q % 0.00% 26.67% 36.67% 36.67% % Totl Avg. 0.00% 0.00% 18.67% 40.00% 41.33% % Tle 5 the umultive nlysis results for gol 4. Q # Very low Low Nominl/Averge High Very high Totl Q % 0.00% 16.67% 40.00% 43.33% % Q % 0.00% 16.67% 30.00% 53.33% % Q % 0.00% 6.67% 50.00% 43.33% % Q % 0.00% 3.33% 46.67% 50.00% % Q % 0.00% 3.33% 56.67% 40.00% % Totl Avg. 0.00% 0.00% 9.33% 44.67% 46.00% % Tle 6 the umultive nlysis results for ll gols. Q # Very low Low Nominl/Averge High Very high Totl Gol % 3.33% % % % % Gol % 0.00% 96.67% % % % Gol % 0.00% 93.33% % % % Gol % 0.00% 46.67% % % % Totl Avg. 0.00% 0.17% 17.83% 42.00% 40.00% % Authors profiles [SYLWAN., 158(6)]. ISI Indexed 101
13 M. Rizwn Jmeel Qureshi- Assistnt Professor t Fulty of Computing & Informtion Tehnology, King Adulziz University, mjor in CBD nd gile Afnn Slem Brhem- Mster student in IT Deprtment t King Adulziz University, interested in Tehnology Mngement, Computer Networks nd Glol Softwre Engineering. [SYLWAN., 158(6)]. ISI Indexed 102
Lesson 4.4. Euler Circuits and Paths. Explore This
Lesson 4.4 Euler Ciruits nd Pths Now tht you re fmilir with some of the onepts of grphs nd the wy grphs onvey onnetions nd reltionships, it s time to egin exploring how they n e used to model mny different
More information[Prakash* et al., 5(8): August, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116
[Prksh* et l 58: ugust 6] ISSN: 77-9655 I Vlue: Impt Ftor: 6 IJESRT INTERNTIONL JOURNL OF ENGINEERING SIENES & RESERH TEHNOLOGY SOME PROPERTIES ND THEOREM ON FUZZY SU-TRIDENT DISTNE Prveen Prksh* M Geeth
More informationCS 241 Week 4 Tutorial Solutions
CS 4 Week 4 Tutoril Solutions Writing n Assemler, Prt & Regulr Lnguges Prt Winter 8 Assemling instrutions utomtilly. slt $d, $s, $t. Solution: $d, $s, nd $t ll fit in -it signed integers sine they re 5-it
More informationOutline. Motivation Background ARCH. Experiment Additional usages for Input-Depth. Regular Expression Matching DPI over Compressed HTTP
ARCH This work ws supported y: The Europen Reserh Counil, The Isreli Centers of Reserh Exellene, The Neptune Consortium, nd Ntionl Siene Foundtion wrd CNS-119748 Outline Motivtion Bkground Regulr Expression
More informationA METHOD FOR CHARACTERIZATION OF THREE-PHASE UNBALANCED DIPS FROM RECORDED VOLTAGE WAVESHAPES
A METHOD FOR CHARACTERIZATION OF THREE-PHASE UNBALANCED DIPS FROM RECORDED OLTAGE WAESHAPES M.H.J. Bollen, L.D. Zhng Dept. Eletri Power Engineering Chlmers University of Tehnology, Gothenurg, Sweden Astrt:
More informationDuality in linear interval equations
Aville online t http://ijim.sriu..ir Int. J. Industril Mthemtis Vol. 1, No. 1 (2009) 41-45 Dulity in liner intervl equtions M. Movhedin, S. Slhshour, S. Hji Ghsemi, S. Khezerloo, M. Khezerloo, S. M. Khorsny
More informationFault tree conversion to binary decision diagrams
Loughorough University Institutionl Repository Fult tree onversion to inry deision digrms This item ws sumitted to Loughorough University's Institutionl Repository y the/n uthor. Cittion: ANDREWS, J.D.
More informationMidterm Exam CSC October 2001
Midterm Exm CSC 173 23 Otoer 2001 Diretions This exm hs 8 questions, severl of whih hve suprts. Eh question indites its point vlue. The totl is 100 points. Questions 5() nd 6() re optionl; they re not
More informationCMPUT101 Introduction to Computing - Summer 2002
CMPUT Introdution to Computing - Summer 22 %XLOGLQJ&RPSXWHU&LUFXLWV Chpter 4.4 3XUSRVH We hve looked t so fr how to uild logi gtes from trnsistors. Next we will look t how to uild iruits from logi gtes,
More informationChapter 9. Greedy Technique. Copyright 2007 Pearson Addison-Wesley. All rights reserved.
Chpter 9 Greey Tehnique Copyright 2007 Person Aison-Wesley. All rights reserve. Greey Tehnique Construts solution to n optimiztion prolem piee y piee through sequene of hoies tht re: fesile lolly optiml
More informationIntroduction to Algebra
INTRODUCTORY ALGEBRA Mini-Leture 1.1 Introdution to Alger Evlute lgeri expressions y sustitution. Trnslte phrses to lgeri expressions. 1. Evlute the expressions when =, =, nd = 6. ) d) 5 10. Trnslte eh
More informationCS553 Lecture Introduction to Data-flow Analysis 1
! Ide Introdution to Dt-flow nlysis!lst Time! Implementing Mrk nd Sweep GC!Tody! Control flow grphs! Liveness nlysis! Register llotion CS553 Leture Introdution to Dt-flow Anlysis 1 Dt-flow Anlysis! Dt-flow
More informationFinal Exam Review F 06 M 236 Be sure to look over all of your tests, as well as over the activities you did in the activity book
inl xm Review 06 M 236 e sure to loo over ll of your tests, s well s over the tivities you did in the tivity oo 1 1. ind the mesures of the numered ngles nd justify your wor. Line j is prllel to line.
More informationPattern Matching. Pattern Matching. Pattern Matching. Review of Regular Expressions
Pttern Mthing Pttern Mthing Some of these leture slides hve een dpted from: lgorithms in C, Roert Sedgewik. Gol. Generlize string serhing to inompletely speified ptterns. pplitions. Test if string or its
More informationLecture 8: Graph-theoretic problems (again)
COMP36111: Advned Algorithms I Leture 8: Grph-theoreti prolems (gin) In Prtt-Hrtmnn Room KB2.38: emil: iprtt@s.mn..uk 2017 18 Reding for this leture: Sipser: Chpter 7. A grph is pir G = (V, E), where V
More informationCOMP108 Algorithmic Foundations
Grph Theory Prudene Wong http://www.s.liv..uk/~pwong/tehing/omp108/201617 How to Mesure 4L? 3L 5L 3L ontiner & 5L ontiner (without mrk) infinite supply of wter You n pour wter from one ontiner to nother
More informationLesson6: Modeling the Web as a graph Unit5: Linear Algebra for graphs
Lesson6: Modeling the We s grph Unit5: Liner Alger for grphs Rene Pikhrdt Introdution to We Siene Prt 2 Emerging We Properties Rene Pikhrdt Institute CC-BY-SA-3. for We Siene nd Tehnologies Modeling the
More informationA Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards
A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin
More informationLecture 13: Graphs I: Breadth First Search
Leture 13 Grphs I: BFS 6.006 Fll 2011 Leture 13: Grphs I: Bredth First Serh Leture Overview Applitions of Grph Serh Grph Representtions Bredth-First Serh Rell: Grph G = (V, E) V = set of verties (ritrry
More informationSOFTWARE-BUG LOCALIZATION WITH GRAPH MINING
Chpter 17 SOFTWARE-BUG LOCALIZATION WITH GRAPH MINING Frnk Eihinger Institute for Progrm Strutures nd Dt Orgniztion (IPD) Universit-t Krlsruhe (TH), Germny eihinger@ipd.uk.de Klemens B-ohm Institute for
More informationCOSC 6374 Parallel Computation. Dense Matrix Operations
COSC 6374 Prllel Computtion Dense Mtrix Opertions Edgr Griel Fll Edgr Griel Prllel Computtion Edgr Griel erminology Dense Mtrix: ll elements of the mtrix ontin relevnt vlues ypilly stored s 2-D rry, (e.g.
More informationIf you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.
Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online
More informationParadigm 5. Data Structure. Suffix trees. What is a suffix tree? Suffix tree. Simple applications. Simple applications. Algorithms
Prdigm. Dt Struture Known exmples: link tble, hep, Our leture: suffix tree Will involve mortize method tht will be stressed shortly in this ourse Suffix trees Wht is suffix tree? Simple pplitions History
More informationGreedy Algorithm. Algorithm Fall Semester
Greey Algorithm Algorithm 0 Fll Semester Optimiztion prolems An optimiztion prolem is one in whih you wnt to fin, not just solution, ut the est solution A greey lgorithm sometimes works well for optimiztion
More informationParallelization Optimization of System-Level Specification
Prlleliztion Optimiztion of System-Level Speifition Luki i niel. Gjski enter for Emedded omputer Systems University of liforni Irvine, 92697, US {li, gjski} @es.ui.edu strt This pper introdues the prlleliztion
More informationClass Overview. Database Design. Database Design Process. Database Design. Introduction to Data Management CSE 414
Introution to Dt Mngement CSE 44 Unit 6: Coneptul Design E/R Digrms Integrity Constrints BCNF Introution to Dt Mngement CSE 44 E/R Digrms ( letures) CSE 44 Autumn 08 Clss Overview Dtse Design Unit : Intro
More informationCan Pythagoras Swim?
Overview Ativity ID: 8939 Mth Conepts Mterils Students will investigte reltionships etween sides of right tringles to understnd the Pythgoren theorem nd then use it to solve prolems. Students will simplify
More information10.2 Graph Terminology and Special Types of Graphs
10.2 Grph Terminology n Speil Types of Grphs Definition 1. Two verties u n v in n unirete grph G re lle jent (or neighors) in G iff u n v re enpoints of n ege e of G. Suh n ege e is lle inient with the
More informationAn Approach to Filter the Test Data for Killing Multiple Mutants in Different Locations
Interntionl Journl of Computer Theory nd Engineering, Vol. 5, No. 2, April 2013 An Approh to Filter the Test Dt for Killing Multiple Mutnts in Different Lotions Ngendr Prtp Singh, Rishi Mishr, Silesh Tiwri,
More informationDistance Computation between Non-convex Polyhedra at Short Range Based on Discrete Voronoi Regions
Distne Computtion etween Non-onvex Polyhedr t Short Rnge Bsed on Disrete Voronoi Regions Ktsuki Kwhi nd Hiroms Suzuki Deprtment of Preision Mhinery Engineering, The University of Tokyo 7-3-1 Hongo, Bunkyo-ku,
More informationWhat are suffix trees?
Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl
More informationDistributed Systems Principles and Paradigms
Distriuted Systems Priniples nd Prdigms Christoph Dorn Distriuted Systems Group, Vienn University of Tehnology.dorn@infosys.tuwien..t http://www.infosys.tuwien..t/stff/dorn Slides dpted from Mrten vn Steen,
More informationWidth and Bounding Box of Imprecise Points
Width nd Bounding Box of Impreise Points Vhideh Keikh Mrten Löffler Ali Mohdes Zhed Rhmti Astrt In this pper we study the following prolem: we re given set L = {l 1,..., l n } of prllel line segments,
More informationInternet Routing. IP Packet Format. IP Fragmentation & Reassembly. Principles of Internet Routing. Computer Networks 9/29/2014.
omputer Networks 9/29/2014 IP Pket Formt Internet Routing Ki Shen IP protool version numer heder length (words) for qulity of servie mx numer remining hops (deremented t eh router) upper lyer protool to
More informationCS453 INTRODUCTION TO DATAFLOW ANALYSIS
CS453 INTRODUCTION TO DATAFLOW ANALYSIS CS453 Leture Register llotion using liveness nlysis 1 Introdution to Dt-flow nlysis Lst Time Register llotion for expression trees nd lol nd prm vrs Tody Register
More informationIncremental Design Debugging in a Logic Synthesis Environment
Inrementl Design Deugging in Logi Synthesis Environment Andres Veneris Jing Brndon Liu University of Toronto Freesle Semiondutors Dept ECE nd CS High Performne Tools Group Toronto, ON M5S 3G4 Austin, TX
More informationMinimal Memory Abstractions
Miniml Memory Astrtions (As implemented for BioWre Corp ) Nthn Sturtevnt University of Alert GAMES Group Ferury, 7 Tlk Overview Prt I: Building Astrtions Minimizing memory requirements Performnes mesures
More informationTriple/Quadruple Patterning Layout Decomposition via Novel Linear Programming and Iterative Rounding
Triple/Qudruple Ptterning Lyout Deomposition vi Novel Liner Progrmming nd Itertive Rounding Yio Lin, Xioqing Xu, Bei Yu, Ross Bldik nd Dvid Z. Pn ECE Dept., University of Texs t Austin, Austin, TX USA
More information12/9/14. CS151 Fall 20124Lecture (almost there) 12/6. Graphs. Seven Bridges of Königsberg. Leonard Euler
CS5 Fll 04Leture (lmost there) /6 Seven Bridges of Königserg Grphs Prof. Tny Berger-Wolf Leonrd Euler 707-783 Is it possile to wlk with route tht rosses eh ridge e Seven Bridges of Königserg Forget unimportnt
More informationV = set of vertices (vertex / node) E = set of edges (v, w) (v, w in V)
Definitions G = (V, E) V = set of verties (vertex / noe) E = set of eges (v, w) (v, w in V) (v, w) orere => irete grph (igrph) (v, w) non-orere => unirete grph igrph: w is jent to v if there is n ege from
More informationTaming Subgraph Isomorphism for RDF Query Processing
Tming Sugrph Isomorphism for RDF Query Proessing Jinh Kim # jinh.kim@orle.om Hyungyu Shin hgshin@dl.posteh..kr Wook-Shin Hn wshn@posteh..kr Sungpk Hong # Hssn Chfi # {sungpk.hong, hssn.hfi}@orle.om POSTECH,
More informationCOSC 6374 Parallel Computation. Non-blocking Collective Operations. Edgar Gabriel Fall Overview
COSC 6374 Prllel Computtion Non-loking Colletive Opertions Edgr Griel Fll 2014 Overview Impt of olletive ommunition opertions Impt of ommunition osts on Speedup Crtesin stenil ommunition All-to-ll ommunition
More informationChapter 4 Fuzzy Graph and Relation
Chpter 4 Fuzzy Grph nd Reltion Grph nd Fuzzy Grph! Grph n G = (V, E) n V : Set of verties(node or element) n E : Set of edges An edge is pir (x, y) of verties in V.! Fuzzy Grph ~ n ( ~ G = V, E) n V :
More informationIMAGE COMPRESSION USING HIRARCHICAL LINEAR POLYNOMIAL CODING
Rsh Al-Tmimi et l, Interntionl Journl of Computer Siene nd Mobile Computing, Vol.4 Issue.1, Jnury- 015, pg. 11-119 Avilble Online t www.ijsm.om Interntionl Journl of Computer Siene nd Mobile Computing
More informationA decision support system prototype for fuzzy multiple objective optimization
EUSFLAT - LFA A eision support system prototype for fuzzy multiple ojetive optimiztion Fengjie Wu Jie Lu n Gungqun Zhng Fulty of Informtion Tehnology University of Tehnology Syney Austrli E-mil: {fengjiewjieluzhngg}@it.uts.eu.u
More informationSMALL SIZE EDGE-FED SIERPINSKI CARPET MICROSTRIP PATCH ANTENNAS
Progress In Eletromgnetis Reserh C, Vol. 3, 195 22, 28 SMALL SIZE EDGE-FED SIERPINSKI CARPET MICROSTRIP PATCH ANTENNAS W.-L. Chen nd G.-M. Wng Rdr Engineering Deprtment Missile Institute of Air Fore Engineering
More informationSlides for Data Mining by I. H. Witten and E. Frank
Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully
More informationDistributed Systems Principles and Paradigms. Chapter 11: Distributed File Systems
Distriuted Systems Priniples nd Prdigms Mrten vn Steen VU Amsterdm, Dept. Computer Siene steen@s.vu.nl Chpter 11: Distriuted File Systems Version: Deemer 10, 2012 2 / 14 Distriuted File Systems Distriuted
More informationProfile Based Sub-Image Search in Image Databases
Profile Bsed Su-Imge Serh in Imge Dtses Vishwkrm Singh 1, Amuj K. Singh 2 Deprtment of Computer Siene, University of Cliforni, Snt Brr, USA 1 vsingh@s.us.edu, 2 muj@s.us.edu Astrt Su-imge serh with high
More informationUTMC APPLICATION NOTE UT1553B BCRT TO INTERFACE PSEUDO-DUAL-PORT RAM ARCHITECTURE INTRODUCTION ARBITRATION DETAILS DESIGN SELECTIONS
UTMC APPLICATION NOTE UT1553B BCRT TO 80186 INTERFACE INTRODUCTION The UTMC UT1553B BCRT is monolithi CMOS integrte iruit tht provies omprehensive Bus Controller n Remote Terminl funtions for MIL-STD-
More informationDistance vector protocol
istne vetor protool Irene Finohi finohi@i.unirom.it Routing Routing protool Gol: etermine goo pth (sequene of routers) thru network from soure to Grph strtion for routing lgorithms: grph noes re routers
More informationMcAfee Web Gateway
Relese Notes Revision C MAfee We Gtewy 7.6.2.11 Contents Aout this relese Enhnement Resolved issues Instlltion instrutions Known issues Additionl informtion Find produt doumenttion Aout this relese This
More informationTight triangulations: a link between combinatorics and topology
Tight tringultions: link between ombintoris nd topology Jonthn Spreer Melbourne, August 15, 2016 Topologil mnifolds (Geometri) Topology is study of mnifolds (surfes) up to ontinuous deformtion Complited
More informationSingle-Layer Trunk Routing Using 45-Degree Lines within Critical Areas for PCB Routing
SASIMI 2010 Proeedings (R3-8) Single-Lyer Trunk Routing Using 45-Degree Lines within Critil Ares for PCB Routing Kyosuke SHINODA Yukihide KOHIRA Atsushi TAKAHASHI Tokyo Institute of Tehnology Dept. of
More informationJournal of Combinatorial Theory, Series A
Journl of Comintoril Theory, Series A 0 (0) Contents lists ville t SiVerse SieneDiret Journl of Comintoril Theory, Series A www.elsevier.om/lote/jt Spheril tiling y ongruent pentgons Hongho Go, Nn Shi,
More informationApproximate Joins for Data Centric XML
Approximte Joins for Dt Centri XML Nikolus Augsten 1, Mihel Böhlen 1, Curtis Dyreson, Johnn Gmper 1 1 Fulty of Computer Siene, Free University of Bozen-Bolzno Dominiknerpltz 3, Bozen, Itly {ugsten,oehlen,gmper}@inf.uniz.it
More informationAdditional Measurement Algorithms in the Overhauser Magnetometer POS-1
Additionl Mesurement Algorithms in the Overhuser Mgnetometer POS-1 O.V. Denisov, A.Y. Denisov, V.A. Spunov (QM Lortory of Url Stte Tehnil University, Mir 19, Ekterinurg, 620002, Russi) J.L. Rsson (Royl
More informationEfficient Subscription Management in Content-based Networks
Effiient Susription Mngement in Content-sed Networks Rphël Chnd, Psl A. Feler Institut EURECOM 06904 Sophi Antipolis, Frne {hnd feler}@eureom.fr Astrt Content-sed pulish/susrie systems offer onvenient
More informationError Numbers of the Standard Function Block
A.2.2 Numers of the Stndrd Funtion Blok evlution The result of the logi opertion RLO is set if n error ours while the stndrd funtion lok is eing proessed. This llows you to rnh to your own error evlution
More information6.045J/18.400J: Automata, Computability and Complexity. Quiz 2: Solutions. Please write your name in the upper corner of each page.
6045J/18400J: Automt, Computbility nd Complexity Mrh 30, 2005 Quiz 2: Solutions Prof Nny Lynh Vinod Vikuntnthn Plese write your nme in the upper orner of eh pge Problem Sore 1 2 3 4 5 6 Totl Q2-1 Problem
More informationCS 340, Fall 2016 Sep 29th Exam 1 Note: in all questions, the special symbol ɛ (epsilon) is used to indicate the empty string.
CS 340, Fll 2016 Sep 29th Exm 1 Nme: Note: in ll questions, the speil symol ɛ (epsilon) is used to indite the empty string. Question 1. [10 points] Speify regulr expression tht genertes the lnguge over
More informationPhotovoltaic Panel Modelling Using a Stochastic Approach in MATLAB &Simulink
hotovolti nel Modelling Using Stohsti Approh in MATLAB &Simulink KAREL ZALATILEK, JAN LEUCHTER eprtment of Eletril Engineering University of efene Kouniov 65, 61 City of Brno CZECH REUBLIC krelzpltilek@unoz,
More informationStep-Voltage Regulator Model Test System
IEEE PES GENERAL MEETING, JULY 5 Step-Voltge Regultor Model Test System Md Rejwnur Rshid Mojumdr, Pblo Arboley, Senior Member, IEEE nd Cristin González-Morán, Member, IEEE Abstrct In this pper, 4-node
More informationCS 551 Computer Graphics. Hidden Surface Elimination. Z-Buffering. Basic idea: Hidden Surface Removal
CS 55 Computer Grphis Hidden Surfe Removl Hidden Surfe Elimintion Ojet preision lgorithms: determine whih ojets re in front of others Uses the Pinter s lgorithm drw visile surfes from k (frthest) to front
More informationGeometrical reasoning 1
MODULE 5 Geometril resoning 1 OBJECTIVES This module is for study y n individul teher or group of tehers. It: looks t pprohes to developing pupils visulistion nd geometril resoning skills; onsiders progression
More informationCOMPUTATION AND VISUALIZATION OF REACHABLE DISTRIBUTION NETWORK SUBSTATION VOLTAGE
24 th Interntionl Conferene on Eletriity Distriution Glsgow, 12-15 June 2017 Pper 0615 COMPUTATION AND VISUALIZATION OF REACHABLE DISTRIBUTION NETWORK SUBSTATION VOLTAGE Mihel SANKUR Dniel ARNOLD Lun SCHECTOR
More informationCOSC 6374 Parallel Computation. Communication Performance Modeling (II) Edgar Gabriel Fall Overview. Impact of communication costs on Speedup
COSC 6374 Prllel Computtion Communition Performne Modeling (II) Edgr Griel Fll 2015 Overview Impt of ommunition osts on Speedup Crtesin stenil ommunition All-to-ll ommunition Impt of olletive ommunition
More informationINTEGRATED WORKFLOW ART DIRECTOR
ART DIRECTOR Progrm Resoures INTEGRATED WORKFLOW PROGRAM PLANNING PHASE In this workflow phse proess, you ollorte with the Progrm Mnger, the Projet Mnger, nd the Art Speilist/ Imge Led to updte the resoures
More informationHonors Thesis: Investigating the Algebraic Properties of Cayley Digraphs
Honors Thesis: Investigting the Algebri Properties of Cyley Digrphs Alexis Byers, Wittenberg University Mthemtis Deprtment April 30, 2014 This pper utilizes Grph Theory to gin insight into the lgebri struture
More informationAgilent G3314AA BioConfirm Software
Agilent G3314AA BioConfirm Softwre Quik Strt Guide Use this guide to instll nd get strted with the BioConfirm softwre. Wht is BioConfirm Softwre? Agilent G3314AA BioConfirm Softwre lets you onfirm the
More informationTroubleshooting. Verify the Cisco Prime Collaboration Provisioning Installation (for Advanced or Standard Mode), page
Trouleshooting This setion explins the following: Verify the Ciso Prime Collortion Provisioning Instlltion (for Advned or Stndrd Mode), pge 1 Upgrde the Ciso Prime Collortion Provisioning from Smll to
More informationTracking Hidden Agents Through Shadow Information Spaces
Trking Hidden Agents Through Shdow Informtion Spes Jingjin Yu Steven M. LVlle jyu@uiu.edu lvlle@uiu.edu Deprtment of Computer Siene University of Illinois Urn, IL 601 USA Astrt This pper ddresses prolems
More informationColour-texture analysis of paintings using ICA filter banks
Colour-texture nlysis of pintings using ICA filter nks Nnne vn Noord Nnne@tilurguniversity.edu Tilurg University, Wrndeln 2, 5037 AB Tilurg, The Netherlnds Eri Postm E.O.Postm@tilurguniversity.edu Tilurg
More informationBayesian Networks: Directed Markov Properties (Cont d) and Markov Equivalent DAGs
Byesin Networks: Direte Mrkov Properties (Cont ) n Mrkov Equivlent DAGs Huizhen Yu jney.yu@s.helsinki.fi Dept. Computer Siene, Univ. of Helsinki Proilisti Moels, Spring, 2010 Huizhen Yu (U.H.) Byesin Networks:
More informationImage Compression based on Quadtree and Polynomial
Interntionl Journl of Computer Applitions (0975 8887 Imge Compression sed on Qudtree nd Polynomil Ghdh Al-Khfj Ph.D Dept. of Computer Siene, Bghdd University, College of Siene. ABSTRACT In this pper, n
More informationTool Vendor Perspectives SysML Thus Far
Frontiers 2008 Pnel Georgi Tec, 05-13-08 Tool Vendor Perspectives SysML Thus Fr Hns-Peter Hoffmnn, Ph.D Chief Systems Methodologist Telelogic, Systems & Softwre Modeling Business Unit Peter.Hoffmnn@telelogic.com
More informationCalculus Differentiation
//007 Clulus Differentition Jeffrey Seguritn person in rowot miles from the nerest point on strit shoreline wishes to reh house 6 miles frther down the shore. The person n row t rte of mi/hr nd wlk t rte
More informationFASTEST METHOD TO FIND ALTERNATIVE RE-ROUTE
INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 FASTEST METHOD TO FIND ALTERNATIVE RE-ROUTE 1 M.JothiLkshmi, M.S., M.Phil. 2 C.Theeendr, M.S., M.Phil. 3 M.K.Pvithr,
More informationType Checking. Roadmap (Where are we?) Last lecture Context-sensitive analysis. This lecture Type checking. Symbol tables
Type Cheking Rodmp (Where re we?) Lst leture Contet-sensitie nlysis Motition Attriute grmmrs Ad ho Synt-direted trnsltion This leture Type heking Type systems Using synt direted trnsltion Symol tles Leil
More informationMITSUBISHI ELECTRIC RESEARCH LABORATORIES Cambridge, Massachusetts. Introduction to Matroids and Applications. Srikumar Ramalingam
Cmrige, Msshusetts Introution to Mtrois n Applitions Srikumr Rmlingm MERL mm//yy Liner Alger (,0,0) (0,,0) Liner inepenene in vetors: v, v2,..., For ll non-trivil we hve s v s v n s, s2,..., s n 2v2...
More information2 Computing all Intersections of a Set of Segments Line Segment Intersection
15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design
More information4.3 Balanced Trees. let us assume that we can manipulate them conveniently and see how they can be put together to form trees.
428 T FOU 4.3 Blned Trees T BT GOIT IN T VIOU setion work well for wide vriety of pplitions, ut they hve poor worst-se performne. s we hve noted, files lredy in order, files in reverse order, files with
More informationString comparison by transposition networks
String omprison y trnsposition networks Alexnder Tiskin (Joint work with Peter Krushe) Deprtment of Computer Siene University of Wrwik http://www.ds.wrwik..uk/~tiskin (inludes n extended version of this
More informationQuadrilateral and Tetrahedral Mesh Stripification Using 2-Factor Partitioning of the Dual Graph
The Visul omputer mnusript No. (will e inserted y the editor) Plo Diz-Gutierrez M. Gopi Qudrilterl nd Tetrhedrl Mesh Stripifition Using 2-Ftor Prtitioning of the Dul Grph strt In order to find 2-ftor of
More informationMixed-Signal Testability Analysis for Data-Converter IPs
Mixed-Signl Testility Anlysis for Dt-Converter IPs Arldo vn de Krts nd Hns G. Kerkhoff Testle Design nd Testing of Nnosystems Group MESA+ Institute for Nnotehnology 7500AE Enshede, the Netherlnds Emil:
More informationPackage Contents. Wireless-G USB Network Adapter with SpeedBooster USB Cable Setup CD-ROM with User Guide (English only) Quick Installation
A Division of Ciso Systems, In. Pkge Contents Wireless-G USB Network Adpter with SpeedBooster USB Cle Setup CD-ROM with User Guide (English only) Quik Instlltion 2,4 GHz 802.11g Wireless Model No. Model
More informationAsymmetric Visual Hierarchy Comparison with Nested Icicle Plots
symmetri Visul Hierrhy Comprison with Nested Iile Plots Fin ek 1, Frnz-Josef Wiszniewsky 2, Mihel urh 1, Stephn Diehl 2, nd Dniel Weiskopf 1 1 VISUS, University of Stuttgrt, Germny 2 University of Trier,
More informationComputational geometry
Leture 23 Computtionl geometry Supplementl reding in CLRS: Chpter 33 exept 33.3 There re mny importnt prolems in whih the reltionships we wish to nlyze hve geometri struture. For exmple, omputtionl geometry
More informationCOMPUTER EDUCATION TECHNIQUES, INC. (WEBLOGIC_SVR_ADM ) SA:
In orer to lern whih questions hve een nswere orretly: 1. Print these pges. 2. Answer the questions. 3. Sen this ssessment with the nswers vi:. FAX to (212) 967-3498. Or. Mil the nswers to the following
More informationComparison of Global Histogram Methods for 2D and 3D Entropy Based Image Segmentation
9th WSEAS Interntionl Conferene on EVOLUTIONARY COMPUTING (EC 8, Sofi, Bulgri, My 2-4, 28 Comrison of Glol Histogrm Methods for 2D nd 3D Entroy Bsed Imge Segmenttion GEORGI PETROV (, PANAYOT ILIEV (2,
More informationInter-domain Routing
COMP 631: NETWORKED & DISTRIBUTED SYSTEMS Inter-domin Routing Jsleen Kur Fll 2016 1 Internet-sle Routing: Approhes DV nd link-stte protools do not sle to glol Internet How to mke routing slle? Exploit
More informationLecture 12 : Topological Spaces
Leture 12 : Topologil Spes 1 Topologil Spes Topology generlizes notion of distne nd loseness et. Definition 1.1. A topology on set X is olletion T of susets of X hving the following properties. 1. nd X
More informationTowards Unifying Advances in Twig Join Algorithms
Pro. 21st Austrlsin Dtse Conferene (ADC 2010), Brisne, Austrli Towrds Unifying Advnes in Twig Join Algorithms Nils Grimsmo Truls A. Bjørklund Deprtment of Computer nd Informtion Siene Norwegin University
More informationA New Method for Solving Intuitionistic Fuzzy. Transportation Problem
pplied Mtemtil Sienes, Vol 7,, no 8, 57-65 HKR Ltd, wwwm-ikriom New Metod for Solving ntuitionisti Fuzzy Trnsporttion Prolem Ngoor Gni PG & Reser Deprtment of Mtemtis Jml Momed College uto Tiruirpplli-6,
More informationTopological Queries on Graph-structured XML Data: Models and Implementations
Topologicl Queries on Grph-structured XML Dt: Models nd Implementtions Hongzhi Wng, Jinzhong Li, nd Jizhou Luo Astrct In mny pplictions, dt is in grph structure, which cn e nturlly represented s grph-structured
More informationSelecting the Most Highly Correlated Pairs within a Large Vocabulary
Seleting the Most Highl Correlted Pirs within Lrge Voulr Koji Umemur Deprtment of Computer Siene Toohshi Universit of Tehnolog umemur@tutistutjp Astrt Ourene ptterns of words in douments n e epressed s
More informationΕΠΛ323 - Θεωρία και Πρακτική Μεταγλωττιστών
ΕΠΛ323 - Θωρία και Πρακτική Μταγλωττιστών Lecture 3 Lexicl Anlysis Elis Athnsopoulos elisthn@cs.ucy.c.cy Recognition of Tokens if expressions nd reltionl opertors if è if then è then else è else relop
More informationUNCORRECTED SAMPLE PAGES. Angle relationships and properties of 6geometrical figures 1. Online resources. What you will learn
Online resoures uto-mrked hpter pre-test Video demonstrtions of ll worked exmples Intertive widgets Intertive wlkthroughs Downlodle HOTsheets ess to ll HOTmths ustrlin urriulum ourses ess to the HOTmths
More informationWORKSHOP 9 HEX MESH USING SWEEP VECTOR
WORKSHOP 9 HEX MESH USING SWEEP VECTOR WS9-1 WS9-2 Prolem Desription This exerise involves importing urve geometry from n IGES file. The urves re use to rete other urves. From the urves trimme surfes re
More informationRobust internal multiple prediction algorithm Zhiming James Wu, Sonika, Bill Dragoset*, WesternGeco
Roust internl multiple preition lgorithm Zhiming Jmes Wu, Sonik, Bill Drgoset*, WesternGeo Summry Multiple ttenution is n importnt t proessing step for oth mrine n ln t. Tehniques for surfe- rpily in the
More information