Analytical Performance Analysis of Network- Processor-Based Application Designs

Size: px
Start display at page:

Download "Analytical Performance Analysis of Network- Processor-Based Application Designs"

Transcription

1 Analytcal Performance Analyss of Networ- Processor-Based Alcaton Desgns e Lu BMC Software Inc. Waltham, MA e Wang Unversty of Massachusetts Lowell, MA Abstract Networ rocessors (NP) are desgned to rovde both erformance and flexblty through arallel and rogrammable archtecture, mang them sueror to general-urose rocessors on erformance and to hardware-based solutons on flexblty. But NPs also ntroduce new challenges. It s mortant to study the lmtatons of NP archtectures so that one can tae full advantage of NP resources to acheve the requred erformance for a gven alcaton. It s therefore desrable to develo a general framewor for analyzng erformance of NPbased alcatons. Ths aer resents an analytcal method for solvng ths roblem. In artcular, we devse a queung networ to model NP resources and alcaton wor flows. We then use queung theory and oeratonal analyss to obtan erformance metrcs on throughut and resonse tme, among other thngs, at the comonent level as well as at the system level. We aly our erformance model to SlceNP, a TCP Slcng mlementaton of content-aware swtches on networ rocessors resented n [], and show that the analytcal results usng our models match the exermental results from actual mlementaton. erformance model; networ rocessor I. INTRODUCTION A networ rocessor s a rogrammable acet rocessng devce that combnes the advantages of low cost and flexblty of a RISC rocessor and scalablty of custom slcon (.e., ASIC chs) [2]. Secfcally desgned to store, rocess, and forward large volumes of data acets at wre seed through arallel and elnng archtectures, NPs are desrable buldng blocs for constructng networ systems that can rocess data acets of any form. They do so through software, rovdng a flexble latform for mlementng dfferent networ alcatons wthout the need to mae new hardware. Moreover, software modules can easly be reused. Thus, NPs allows users to create and add, through software, the latest and best networ servces, and n the same tme reduce develoment cost and rovde quc-tme-to-maret roducts. Programmng NPs s challengng. Ths challenge s on to of the general ssues that all software develong would face. For examle, snce several choces of desgns for solvng the same roblem often exst, how do we now whch desgn of data flow archtecture would rovde the best erformance? To answer ths queston we would need to obtan quanttatve analyss results. Pacet rocessors do not have oeratng systems. Ths means that software desgners need to exlctly allocate NP resources when desgnng NP-based alcatons, ncludng rocessor cycles, threads and memory unts. Tae memory unts as an examle, t s obvous that data structures that are accessed nfrequently, such as acet ayloads, should be laced n DRAM, whle data structures that are accessed frequently, such as loou tables, should be laced n SRAM. Some NPs, however, have multle channels for the same memory unt, mang t dffcult to determne how to allocate an ndvdual data structure to whch memory channel to obtan the best erformance. The decson would deend on the accessng attern n the artcular alcaton we are tryng to solve. Other functonal unts n NPs have the smlar roblem. Most networ alcatons have secfc erformance requrements, ncludng requrements on throughut and delay latency. How can one now whether the target NP would meet the requrements? If not, would an alternate NP, or an array of NPs, rovde the requred erformance? These questons call for erformance analyss tools that rovde quanttatve results. Boundng calculatons and dscrete event smulatons are two common analyss methods. Boundng calculatons, also called "bac of the enveloe" calculatons, are often used to qucly assess the maxmum throughut of a sngle system comonent. But ths method has several serous lmtatons. For examle, boundng calculatons tend to yeld otmstc redctons that are unrealstc, for the redcted erformance would lely decrease when more detals about the system are taen nto consderaton. For another examle, an NP has multle comonents, each of whch has requests queued u watng for servce. Smle bound calculatons cannot redct latency, nor can they model any nteracton between comonents. Dscrete event smulatons use a global tme and an event scheduler to measure erformance of a desgn. Transtons are reresented by dfferent objects of an event. All events have assocated tmestams. The smulaton rogram executes the events one at a tme n the order of ncreasng tmestams. The global tme jums from one event tmestam to the next. In addton to smulatng the logc of the system beng modeled, events have to udate the counters used for statstcs, rovdng detaled erformance characterstcs of the modeled system. Most NP vendors rovde develoment tool sets, ncludng a smulator, whch can be used to rovde more accurate erformance analyss of an alcaton. But most of the smulators can only erform the erformance analyss after the alcaton rograms are mlemented. We note that t s often

2 mossble to mlement every ossble desgn to choose the best one. Thus, much tme and effort wll be wasted at ths stage f t turns out that the chosen archtectural desgn does not meet the erformance requrements. We also note that smulators are desgned for a secfc NP model or an NP roduct lne. To the best of our nowledge there has been no tool that allows users to comare (even f just roughly comare) the erformance across dfferent tyes of NPs. To overcome the lmtatons n boundng calculatons and dscrete event smulatons, we ntroduce n ths aer an analytcal method that rovdes a general framewor for analyzng NP-based alcatons wthout mlementng them. The rest of the aer s structured as follows. In Secton II we descrbe the base-lne archtecture common n any tye of networ rocessors. In Secton III, we construct a queungnetwor for modelng NP comutatons. In Secton IV, we comare analytcal results obtaned from our theoretcal models wth an actual mlementaton of a TCP slcng content-aware swtch called SlceNP. We show that our analytcal results are consstent wth the actual erformance analyss. Fgure. General archtecture of networ rocessor Core CPU Interface External On Ch Networ Interface II. GENERAL ARCHITECTURE OF NETWOR PROCESSOR No ndustry consensus exsts at ths ont regardng what hardware comonents should be ncluded n a networ rocessor and how they should be organzed on a ch. NP archtectures from dfferent vendors vary consderably, but they share the same base-lne concets and structures. In general, a tycal NP conssts of an array of rogrammable acet rocessors () n a hghly arallel archtecture, a rogrammable control rocessor (a..a. core rocessor), hardware corocessors (CP) or accelerators for common networng oeratons, hgh-seed memory nterfaces, and hgh-seed networ nterfaces. Fgure shows the general NP archtecture of a networ rocessor. Pacet rocessors Pacet rocessors are RISC-based rocessors, wth the advantage of beng small, fast, nexensve, easy to ntegrate wth other hardware, and easy to rogram. s erform datalane tass and rovde fast-ath data rocessng at wre seed. CP Data Transfer Unt CP Fabrc Interface Networ Processor PHY Most acets are rocessed by s. s use an nstructon set that s otmzed for acet rocessng. I/O latences affect erformance a great deal. To hde memory latences most s emloy mult-threadng technology on hardware to rocess multle acets on a sngle concurrently. It mnmzes the overhead of context swtchng, thus sgnfcantly ncreasng the overall throughut. Data-lane tass nclude acet classfcaton, forwardng, flterng, header manulatng, rotocol converson and olcng. Most rocessng n networ alcatons occurs n data lanes. Control rocessor The control rocessor s a general-urose rocessor that runs an embedded oeratng system. The control rocessor rovdes overall control, erforms confguraton management, and rocesses exceton acets. Exceton acets could be control-lane-related, or data-lane-related that may requre extra rocessng such as IP acets wth otons. Corocessors The corocessors are secal-urose hardware, rovdng secfc functons for carryng out common networ tass, ncludng attern matchng, table loou, buffer management, queue management, hashng, checsum comutaton, and encryton/decryton. Snce these functons are commonly used n acet rocessng regardless whch rotocols are used, mlementng them va hardware seeds u executon. Corocessors can be used to smlfy software creaton, for they rovde a sngle-nstructon access to comlex oeratons. Networ and fabrc nterfaces The fabrc nterfaces handle nteracton between rocessors and fabrc swtch, and networ nterfaces handle nteracton between rocessors and the hyscal layer of the external networ. Most networ rocessors also nclude data transfer unts that are resonsble for movng acets between MAC devces and memory drectly. Hgh seed memory s exensve. Regular comuter systems often use dfferent tyes of memores n a herarchcal manner to balance between cost and seed. For examle, an on-ch level cache has the fastest seed, but wth the smallest caacty (.e., the number of bytes t can store). Level 2 and level 3 caches each rovde lower seed wth larger caacty than the revous level. The man memory has the largest caacty but wth the lowest seed. To acheve good erformance, data that are more frequently accessed are stored n faster memores. NPs adot a smlar memory herarchy. Snce NPs are used to rocess a large volume of networ acet data that demonstrates almost no localty, most NPs do not rovde cache to acet rocessors. Some NPs rovde on-ch memory for fast accessng. All NPs rovde hgh-seed memory nterface for varous levels of external memory, where

3 the Statc RAM (SRAM) rovdes faster seed and the Dynamc RAM (DRAM) rovdes large storage wth lower accessng seed. Unle conventonal comuter systems, NP rogrammers need to exlctly choose whch memory to store whch data. Normally, SRAM s used to store confguraton and status nformaton, or acet headers n some cases, whch needs to be accessed frequently. DRAM rovdes large sace to buffer the ayload data that are less frequently accessed. A number of ch maers manufacture varous tyes of networ rocessors. The most oular models nclude AMCC npcore famly [] and Intel IXP famly [5]. III. QUEUING NETWOR MODEL Any NP-based alcaton would tycally go through three elnng stages: acet recevng, acet rocessng, and acet transmttng. Pacet recevng and acet transmttng can each be mlemented on a sngle acet rocessor or on multle acet rocessors n arallel. Pacet rocessng can be mlemented on multle acet rocessors n arallel or n elne. We model acet flows on a networ rocessor as a queung networ, llustrated n Fgure 2. We then devse a erformance model from t. Incomng acet data Recevng Onch Co Processng SRAM Fgure 2. Queung networ model of networ rocessor In ths queung networ model we suly a searate nut queue to each acet rocessor, corocessor, and memory unt. We assume three levels n the memory herarchy: on-ch memory, SRAM, and DRAM. Snce the control rocessor s normally used to manage confguratons and handle excetons, rather than rocessng acets on the fast data ath, t has less mact on the overall erformance of an alcaton and so we do not nclude t n the model. We assume that acet recevng and acet transmttng are each handled by a acet rocessor, and acet rocessng s handled by multle acet rocessors n arallel. Usng the multthreadng mechansm, acet rocessors do not need to be held watng for resonse from corocessor, thus the corocessors are modeled n the same way as acet rocessors do. There are several ways to allocate resources. For smlcty, we resent here a smler model, whch can be extended wth easy modfcatons to meet other confguratons. Transmttng DRAM Outgong acet data Crtcal arameters We dentfy the followng arameters that are crtcal for evaluatng analytcal models for each resource as well as for the entre NP. Arrval rate: It s the number of requests or acets that arrve er second. Throughut: It s the number of requests or the number of acets comleted er second. Resource utlzaton: It s the ercentage of tme that the resource s busy rocessng requests. Average resonse tme: It s the average tme duraton that each request or acet sends nsde the NP. The arrval rate can be easly measured externally. It can also be secfed exlctly. If the analyss nterval s large enough, the system throughut s, accordng to the flow equlbrum rncle, the same as the system arrval rate. In a conventonal comuter system, the oeratng system measures accurately the utlzaton of resources, such as utlzaton of rocessors the utlzaton of memores. Naturally, NP-based alcatons should always try to acheve otmal erformance and elmnate unnecessary overheads. There s usually no measurement on acet rocessor utlzatons. Whle the measurement of queue length at each acet rocessor s relatvely easy to obtan, we note that frequent samlng would cause sgnfcant negatve erformance mact. On the other hand, coarse samlng would cause bg dstorton. Thus, we use the servce demand method. Servce demands of each resource may be calculated va seudo code analyss. We frst measure servce rate, throughut, and resonse tme at the comonent level usng queung networ analyss. We then use these measures to measure throughut and resonse tme at the system level by treatng the whole system as a blac box. Comonent level modelng The queung networ model shown n Fgure 2 s a closed model. We use t to analyze erformance at the comonent level. There are a fxed number of requests n the system. Mean Value Analyss We choose the Mean Value Analyss (MVA) to solve closed queung networ model. MVA s ntutve and s wdely used. The detaled descrton and dervaton of the MVA algorthm can be found, e.g., n [7]. The algorthm can be smlfed as a rocedure of recursvely alyng three equatons: the resdence-tme equaton, the throughut equaton, and the queue length equaton, as shown n Equaton (3 ) to (3 3). Resdence tme equaton: D R ( n) = D delay resource [ + Q ( n ) ] queung resource (3 )

4 Throughut equaton: X ( n) = = n R ( n) Queue length equaton: (3 2) Q ( n) = X ( n) R ( n) (3 3) Here denotes the ndex of the resource, the total number of resources, and n the total number of requests resde n the queung networ. We assume that the servce demand at each resource,, s nown by dervng from seudo code analyss. D Resdence tme s the total amount of tme that a request stays n a resource. It s the sum of the servce tme and the queung tme that the request wats for servce. The resdence tme at a delay resource s the same as the servce tme, snce there s no watng queue at delay resources. The resdence tme equatons for the queung resources means that the tme a request sends watng n the queue s the accumulated servce tme of all requests n front of t n the queue. The throughut equaton s derved from Lttle s Law (see, e.g., [3]). The end-to-end resonse tme of a request gong through the queung networ s the summaton of the tme t sends at each resource, whch s the resdence tme. The average queue length at resource when there are n requests n the system, Q (n), s the average number of requests at the resource. Thus, the queue length equaton can be derved from Lttle s Law and the Forced Flow Law [3]. Throughut bound To mae the MVA algorthm converge, we need to fnd the bound of the system throughut. The maxmum throughut of a system s determned by the bottleneced devce. Accordng to the Servce Demand Law [3], we have D =U /X, where U s the utlzaton of resource, and X s the throughut of the entre system. Snce the utlzaton of any resource can never exceed %, we have X D for any resource. Then we have, X (3 4) max D = Intutvely, the maxmum throughut the system can ever acheve s bounded by the resource wth largest servce demand. Therefore the resource wth the largest servce demand s the bottleneced resource n the queung networ. Parallel rocessor modelng In the queung networ model shown n Fgure 2, there are multle acet rocessors handlng data n arallel n the acet rocessng stage. In ths case, there are multle resources servng requests from a sngle queue. The basc oeratonal analyss equatons does not account for ths case. Sedmann [9] roosed an aroxmaton method for analyzng arallel server statons wth a sngle server under medum to heavy utlzatons. The dea s to convert the confguraton of arallel servers nto the confguraton of seralzed servers. Assume that there are m arallel resources tang requests from a sngle queue, and the servce demand on each ndvdual resource s D. Then all m resources can be relaced wth a sngle resource that s m tmes faster than each ndvdual s orgnal resource. Therefore, the servce demand on ths new resource s D/m. In ths way, the watng tme on the queue s close to the watng tme n the system wth m arallel resources. A second resource s added n tandem to rectfy the mean-tme-n-staton estmates by assurng that the total servce remans the same. Hence, the second resource can be vewed as a delay resource wthout watng queues. The servce demand on the delay resource s D*(m-)/m. Requests under lght load send no watng tme n the queue. Thus, the average resonse tme for a request n the new confguraton s D/m + D*(m-)/m = D. Ths matches the average resonse tme for a request n the orgnal arallel confguraton. Resources under heavy load are busy most of the tme. The domnant art of the average resonse tme s the watng tme sent n the queue. The tme delay from the delay resource becomes neglgble. The average watng tme n the queue of the sngle resource s the same as the average watng tme n the queue of the m arallel resources. Usng ths aroxmaton, the arallel acet rocessors n Fgure 2 are relaced wth a sngle queung resource lus a delay resource, as llustrated n Fgure 3. 2 m D ( m ) D m m D Fgure 3. Aroxmate modelng on arallel rocessors System level modelng From the vewont of an outsde observer, the whole queung networ n Fgure 2 can be treated as a blac box. It taes requests, or acets, one by one from ts nut queue and comletes them as outut. Ths blac box resents no dfference from a queung resource dscussed before. It s therefore a erfect examle of an oen queung networ model. Unle most other resources, the servce rate vares deendng on the number of requests n the system. Thus the servce rate t can be treated as a load-deendent resource. Usng analyss at the comonent level, we may obtan an array of throughut based on dfferent numbers of requests,, n the system. Then the varable servce rate can be derved from them as below. ( ) ( ) X < μ = (3 5) X

5 Here s the number of requests n the system when t reaches the maxmum throughut. It can be found usng the MVA algorthm. Assume that the requests arrve at a constant rate,, and the nut queue of the networ rocessor system s unbounded. The equlbrum robablty [8] can be rewrtten as follows: = ρ + + = = ( ) ( )( ρ ) < (3 6) ( ) X ( ) ρ ( ) ( ) = X ( ) X ( 2) L X ( ) X ( ) (3 7) Here and ρ =. Then the average number of requests n the system can be further derved as below. = N = ρ + ( ) ( + ρ ) ( )( ) 2 ρ (3 8) In the oen queung networ model, the arrval rate has to be less than the maxmum throughut, that s, < X ( ). Otherwse, the watng queue may grow to nfnty. So does the average resonse tme. Accordng to the equlbrum rncle of oen queung networ, the throughut s equal to the arrval rate, X =. Alyng Lttle s Law we may obtan the average resonse tme as follows: N N R = = (3 9) X Bounded nut queue length The assumton of unbounded queue length n revous secton s unrealstc n a real networ system, for the sze of the nut buffer of any system s bounded. Once the nut buffer s full, any new ncomng acets wll be droed. In many cases, the networ system utlzaton s not too hgh, or the average servce rate s much greater than the average arrval rate. Then the watng queue would not grow too long. If the nut buffer s reasonably large, drong acets s not an ssue. The analyss model wth unbounded queue length s suffcent for modelng such systems. In desgnng NP-based alcatons, t s mortant to fnd a good balance between the nut buffer sze and the acet drong rate. If certan acet drong rate s accetable, t would be reasonable to lmt the queue length for achevng better average resonse tme. For networ systems that exect to reach the queue length bound, the analyss model wth unbounded queue length s not suffcent. The queue length bound has to be factored n. Bounded queue length means that there are a bounded number of states n the state transton dagram. Suose s the maxmum number of requests allowed n the system, the varable servce rate n equatons (3 5), (3 6) and (3 7) can be rewrtten searately for when and when <. When <, ( ) =, L μ = X, (3 ) = + = ( ) ( ) (3 ) = (3 2) When, ( ) ( ) X =, L, μ = (3 3) X =, L, + + = + = = ( ) ( ) X ( ) ( ) ρ ( ρ ) ( )( ρ ) =, L, =, L (3 4) (3 5) Then, the average number of requests n the system can be derved by alyng the followng equaton: N = = (3 6) In systems wth bounded queue length, the erformance modelng concerns not only the throughut and average resonse tme, but also the acet drong rate. The roorton of the droed acets s the fracton of tme when there are requests n the system. Based on equatons (3 2) and (3 5), we have = < ( ) (3 7) X ( ) ρ ( ) Multle class worloads The analyss model descrbed n revous sectons deals wth a sngle worload class only. Unle a standard comuter system, a networ rocessor s dedcated to a secfc alcaton n many cases. There s only one worload runnng on t. The sngle class analyss model s suffcent for such systems. However, the analyss model can be easly extended to handle multle worload classes, for the stuatons that multle alcatons run on a sngle NP. The detal analyss for multle-class worload s omtted n ths aer.

6 For smlcty, our analyss model currently consders only the smle case of NP beng a multlexer. We leave the extenson to concentrator functon to future wor. IV. ALICATION ANALYSIS SlceNP To valdate our analytcal model we aly t to actual NPbased alcatons. In artcular, we choose SlceNP [] as an examle. SlceNP mlements TCP Slcng for a content aware swtch usng an Intel IXP24 networ rocessor. It rocesses data usng four comonents: acet recevng, acet transmttng, rocessng of acet from clent, and rocessng of acet from server. Each comonent s assgned wth a dedcated acet rocessor called a mcroengne (ME) n the IXP technology. When the swtch receves a connecton start request (SYN) from the clent, t establshes a TCP connecton wth the clent usng the handshae rotocol. Once recevng the HTTP request, t arses the request and matches t wth reset olcy to fnd the target server. After the target server s dentfed, t establshes another TCP connecton wth the server usng the handshae rotocol agan. Then the two connectons are slced together. Unle most Layer-7 swtches, SlceNP creates a brand new TCP connecton wth target server for each connecton from the clent. Table summarzes the acet nteracton sequence for each HTTP request. From clent From server To clent To server SYN SYN/AC AC/Request AC SYN SYN/AC AC/Request Resonse Resonse AC AC FIN FIN FIN/AC FIN/AC AC AC Table. Pacet sequence n swtch for each HTTP request The shaded entres are acet nteractons after the two TCP connectons are slced. If the request fle sze s larger than the MTU, the fle s broen nto multle acets, and so there are multle ars of resonse and AC acets for that fle. Analyss method For a Layer-7 swtch, t s easy to obtan the request arrval rate and the average acet sze. But t s dffcult to measure the average servce demand for each request or the number of acets n the queue at each resource. In our study we estmate servce demand by analyzng the seudo code of each alcaton. MEs n IXP24 are RISC rocessors, and so most nstructons only tae one cloc cycle. Thus, servce demand for an ME can be obtaned based on the number of nstructons for rocessng each request. For memory access, the servce demand can be obtaned based on the average access latency and the number of memory reference made for each request. D ME D SRAM nstructon _ count = (4 ) cloc _ rate reference_ count SRAM _ latency = (4 2) cloc _ rate reference _ count DRAM _ latency D DRAM = (4 3) cloc _ rate reference_ count SHaC _ latency D SHaC = (4 4) cloc _ rate When usng multle MEs n arallel at the rocessng stage, the MEs are relaced wth two resources n the model shown n Fgure 3. Therefore, the servce demands for the aggregated resource and delay resource are dfferent from those of a sngle ME. D ame D dme nstructon _ count = (4 5) cloc _ rate ME _ count nstructon _ count ( ME _ count ) = (4 6) cloc _ rate ME _ count The related hardware arameters for an IXP24 networ rocessor are lsted n Table 2 [4]. ME Cloc Rate (MHz) ME Latency (rocessor cloc cycles) Threrads SHaC SRAM DRAM Table 2. Intel IXP24 arameters SHaC s a functonal unt rovdng on-ch memory (called scratchad), hashng, and control status regsters. Pseudo code analyss Accordng to the desgn descrton of SlceNP, we derve seudo code modules and summarze estmated servce demands n Table 3. We obtan estmated servce demands for the modules wth * from the standard mcroblocs that come wth the Intel IXA SD. Not every acet goes through all modules. The modules n the shaded area are only executed for certan secfc acet tyes. All acets are rocessed by Data Forward after the two connectons are slced. Based on Tables and 3 we can derve the servce demand on each resource for one HTTP request. The number of acets for HTTP request and resonse vary, deendng on the request fle sze. In our exerment, we assume that the request s small enough to ft nto one acet, and the MTU for the resonse acet s 5 bytes for Ethernet. Module Inst. SHaC SRAM DRAM Cycles Ref. Ref. Ref. Pacet Rx* 86 DL Source* 33 Ethernet Deca* 2 IP Valdate Ctrl Bloc Loou 64 3 TCP Valdate Clent SYN 3 6 Clent AC/Request 2 72

7 Server SYN/AC 35 8 Data Forward 28 Clent FIN 2 Server FIN/AC 2 8 Ethernet Enca* 6 DL Sn* 54 Pacet Tx* 92 2 Table 3. Pseudo code summary of SlceNP desgn In order to comare the analytcal results obtaned from our erformance model wth the actual measured results from SlceNP mlementaton, we choose the same set of request fle szes to obtan the maxmum throughut. We then convert the throughut results n terms of requests nto bytes, based on Table. The left chart of Fgure 4 shows the results. Our analytcal results match the measured results from actual mlementatons resented n [], whch s shown n the rght chart of Fgure 4 (The only dscreancy s when request fle sze s small). Ths valdates our aroach Request f le s ze (B) Fgure 4. Throughut result comarson When the swtch reaches ts maxmum throughut, the average resonse tme s often unaccetable. Fgure 5 llustrates how the average resonse tme changes accordng to the throughut. Ths could rovde a gudelne to the alcaton desgner. In our exerment we fx the request fle sze to 6B. The resonse tme reaches to.9 second when the throughut reaches the maxmum of 22 requests. V. CONCLUSION In ths aer, we roose and valdate a general analytcal framewor for measurng the erformance of NP-based alcaton desgns. It allows alcaton desgners to evaluate the erformance of a desgn wth accuracy to determne whether t meets the erformance requrement, and thus t saves desgners tme and effort from the need of actually mlementng the desgn to obtan erformance measurements from smulatons. ACNOWLEDGEMENT Ths wor was suorted n art by an Intel grant. The second author was also suorted by NSF under grant CCF REFERENCES [] htt:// [2] D. Comer, Networ Systems Desgn Usng Networ Processors, Pearson Prentce Hall, 24 [3] P. Dennng and. Buzen, The Oeratonal Analyss of Queueng Networ Models, Comutng Survey, Volume, Number 3, Setember 978 [4] Intel IXP24 Networ Processor Datasheet, February 24 [5] htt://develoer.ntel.com/desgn/networ/roducts/nfamly/ [6] D. Menasce and V. Almeda, Caacty Plannng for Web Servces, Prentce Hall PTR, 22 [7] M. Reser and S. Lavenburg, Mean-Value Analyss of Closed Multchan Queung Networs, ournal of the Assocaton for Comutng Machnery, Volume 27, Number 2, Arl 98 [8] T. Robertazz, Comuter Networs and Systems: Queueng Theory and Performance Evaluaton, Srnger-Verlag, 99 [9] A. Sedmann, P. Schwetzer and S. Shalev-Oren, Comuterzed Closed Queueng Networ Models of Flexble Manufacturng Systems, Large Scale Systems, Volume 2, Number 4, 987 [] L. Zhao, Y. Luo, L. Bhuyan and R. Iyer, SlceNP: A TCP Slcer usng A Networ Processor, ACM Symosum on Archtectures for Networ and Communcatons System, Prnceton, N, October 25 2 Resonse tme (ms) Arrval rate (Requests/sec) Fgure 5. Resonse tme vs. arrval rate Resonse Tme (ms) Arrval Rate (Requests/sec) Request Drong Rate 2% % 8% 6% 4% 2% % Arrval Rate (Requests/sec) Boundng the nut queue length s an easy way to sgnfcantly mrove the resonse tme at the rce of drong requests. The quantfed results wll hel to determne f t s accetable. Fgure 6 shows that the resonse tme s mroved tremendously whle the request drong rate s stll et low. Q lmt Q lmt 5 Q lmt Q lmt Q lmt 5 Q lmt Fgure 6. Resonse tme and request drong rate wth lmted Q length We observe that addng addtonal MEs maes no sgnfcant erformance mrovement. Ths s because the bottlenec of the alcaton s on SRAM access. In order to sgnfcantly mrove erformance, one has to ether reduce I/O reference to SRAM or dstrbute SRAM to multle channels f they are avalable.

Keywords: Cloud Computing, Resource Allocation, Queueing Theory, Performance Measures.

Keywords: Cloud Computing, Resource Allocation, Queueing Theory, Performance Measures. Volume, Issue 9, Setember ISSN: 77 8X Internatonal Journal of Advanced Research n Comuter Scence and Software Engneerng Research Paer Avalable onlne at: wwwjarcssecom Resource Allocaton n Cloud Comutng

More information

A Scheduling Algorithm of Periodic Messages for Hard Real-time Communications on a Switched Ethernet

A Scheduling Algorithm of Periodic Messages for Hard Real-time Communications on a Switched Ethernet IJCSNS Internatonal Journal of Comuter Scence and Networ Securty VOL.6 No.5B May 26 A Schedulng Algorthm of Perodc Messages for Hard eal-tme Communcatons on a Swtched Ethernet Hee Chan Lee and Myung Kyun

More information

Evaluation of Parallel Processing Systems through Queuing Model

Evaluation of Parallel Processing Systems through Queuing Model ISSN 2278-309 Vkas Shnde, Internatonal Journal of Advanced Volume Trends 4, n Computer No.2, March Scence - and Aprl Engneerng, 205 4(2), March - Aprl 205, 36-43 Internatonal Journal of Advanced Trends

More information

Broadcast Time Synchronization Algorithm for Wireless Sensor Networks Chaonong Xu 1)2)3), Lei Zhao 1)2), Yongjun Xu 1)2) and Xiaowei Li 1)2)

Broadcast Time Synchronization Algorithm for Wireless Sensor Networks Chaonong Xu 1)2)3), Lei Zhao 1)2), Yongjun Xu 1)2) and Xiaowei Li 1)2) Broadcast Tme Synchronzaton Algorthm for Wreless Sensor Networs Chaonong Xu )2)3), Le Zhao )2), Yongun Xu )2) and Xaowe L )2) ) Key Laboratory of Comuter Archtecture, Insttute of Comutng Technology Chnese

More information

Index Terms-Software effort estimation, principle component analysis, datasets, neural networks, and radial basis functions.

Index Terms-Software effort estimation, principle component analysis, datasets, neural networks, and radial basis functions. ISO 9001:2008 Certfed Internatonal Journal of Engneerng and Innovatve Technology (IJEIT The Effect of Dmensonalty Reducton on the Performance of Software Cost Estmaton Models Ryadh A.K. Mehd College of

More information

Quantifying Performance Models

Quantifying Performance Models Quantfyng Performance Models Prof. Danel A. Menascé Department of Computer Scence George Mason Unversty www.cs.gmu.edu/faculty/menasce.html 1 Copyrght Notce Most of the fgures n ths set of sldes come from

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

IMRT workflow. Optimization and Inverse planning. Intensity distribution IMRT IMRT. Dose optimization for IMRT. Bram van Asselen

IMRT workflow. Optimization and Inverse planning. Intensity distribution IMRT IMRT. Dose optimization for IMRT. Bram van Asselen IMRT workflow Otmzaton and Inverse lannng 69 Gy Bram van Asselen IMRT Intensty dstrbuton Webb 003: IMRT s the delvery of radaton to the atent va felds that have non-unform radaton fluence Purose: Fnd a

More information

Gentle Early Detection Algorithm

Gentle Early Detection Algorithm Gentle Early etecton Algorthm Hussen Abdel-jaber 1, Mahmoud Abdeljaber 2, Hussen Abu Mansour 1, Malak El-Amr 1 1 Faculty of Comuter Studes, eartment of Informaton Technology and Comutng, Arab Oen Unversty,

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Optimized Query Planning of Continuous Aggregation Queries in Dynamic Data Dissemination Networks

Optimized Query Planning of Continuous Aggregation Queries in Dynamic Data Dissemination Networks WWW 007 / Trac: Performance and Scalablty Sesson: Scalable Systems for Dynamc Content Otmzed Query Plannng of Contnuous Aggregaton Queres n Dynamc Data Dssemnaton Networs Rajeev Guta IBM Inda Research

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Efficient Caching of Video Content to an Architecture of Proxies according to a Frequency-Based Cache Management Policy

Efficient Caching of Video Content to an Architecture of Proxies according to a Frequency-Based Cache Management Policy Effcent Cachng of Vdeo Content to an Archtecture of Proxes accordng to a Frequency-Based Cache Management Polcy Anna Satsou, Mchael Pateraks Laboratory of Informaton and Comuter Networks Deartment of Electronc

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

TIME-EFFICIENT NURBS CURVE EVALUATION ALGORITHMS

TIME-EFFICIENT NURBS CURVE EVALUATION ALGORITHMS TIME-EFFICIENT NURBS CURVE EVALUATION ALGORITHMS Kestuts Jankauskas Kaunas Unversty of Technology, Deartment of Multmeda Engneerng, Studentu st. 5, LT-5368 Kaunas, Lthuana, kestuts.jankauskas@ktu.lt Abstract:

More information

Traffic Classification Method Based On Data Stream Fingerprint

Traffic Classification Method Based On Data Stream Fingerprint 5th nternatonal Conference on Advanced Materals and Comuter Scence (CAMCS 6) Traffc Classfcaton Method Based On Data Stream Fngerrnt Kefe Cheng, a, Guohu We,b and Xangjun Ma3,c College of Comuter Scence

More information

Application of Genetic Algorithms in Graph Theory and Optimization. Qiaoyan Yang, Qinghong Zeng

Application of Genetic Algorithms in Graph Theory and Optimization. Qiaoyan Yang, Qinghong Zeng 3rd Internatonal Conference on Materals Engneerng, Manufacturng Technology and Control (ICMEMTC 206) Alcaton of Genetc Algorthms n Grah Theory and Otmzaton Qaoyan Yang, Qnghong Zeng College of Mathematcs,

More information

THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY

THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY Proceedngs of the 20 Internatonal Conference on Machne Learnng and Cybernetcs, Guln, 0-3 July, 20 THE CONDENSED FUZZY K-NEAREST NEIGHBOR RULE BASED ON SAMPLE FUZZY ENTROPY JUN-HAI ZHAI, NA LI, MENG-YAO

More information

A Model for System Resources in Flexible Time-Triggered Middleware Architectures

A Model for System Resources in Flexible Time-Triggered Middleware Architectures A Model for System Resources n Flexble Tme-Trggered Mddleware Archtectures Adran Noguero 1, Isdro Calvo 2, Lus Almeda 3, and Una Gangot 2 1 Tecnala, Software Systems Engneerng Unt, Parque Tecnológco de

More information

An Approach for Congestion Control in Sensor Network Using Priority Based Application*

An Approach for Congestion Control in Sensor Network Using Priority Based Application* An Aroach for Congeston Control n Sensor Network Usng Prorty Based Alcaton* Md. Obadur Rahman Muhammad Mostafa Monowar Byung Goo Cho Choong Seon Hong Deartment of Comuter Engneerng, Kyung Hee Unversty

More information

ACCURATE BIT ALLOCATION AND RATE CONTROL FOR DCT DOMAIN VIDEO TRANSCODING

ACCURATE BIT ALLOCATION AND RATE CONTROL FOR DCT DOMAIN VIDEO TRANSCODING ACCUATE BIT ALLOCATION AND ATE CONTOL FO DCT DOMAIN VIDEO TANSCODING Zhjun Le, Ncolas D. Georganas Multmeda Communcatons esearch Laboratory Unversty of Ottawa, Ottawa, Canada {lezj, georganas}@ mcrlab.uottawa.ca

More information

Time-based Adaptive Retry for Wireless Video Streaming 1

Time-based Adaptive Retry for Wireless Video Streaming 1 Tme-based Adatve etry for Wreless Vdeo Streamng 1 Me-Hsuan Lu, Peter Steenkste, and Tsuhan Chen Electrcal and Comuter Engneerng Deartment Carnege Mellon Unversty 5000 Forbes Avenue, Pttsburgh PA 15213-3890,

More information

A new Algorithm for Lossless Compression applied to two-dimensional Static Images

A new Algorithm for Lossless Compression applied to two-dimensional Static Images A new Algorthm for Lossless Comresson aled to two-dmensonal Statc Images JUAN IGNACIO LARRAURI Deartment of Technology Industral Unversty of Deusto Avda. Unversdades, 4. 48007 Blbao SPAIN larrau@deusto.es

More information

Skew Estimation in Document Images Based on an Energy Minimization Framework

Skew Estimation in Document Images Based on an Energy Minimization Framework Skew Estmaton n Document Images Based on an Energy Mnmzaton Framework Youbao Tang 1, Xangqan u 1, e Bu 2, and Hongyang ang 3 1 School of Comuter Scence and Technology, Harbn Insttute of Technology, Harbn,

More information

Recognition of Identifiers from Shipping Container Images Using Fuzzy Binarization and Enhanced Fuzzy Neural Network

Recognition of Identifiers from Shipping Container Images Using Fuzzy Binarization and Enhanced Fuzzy Neural Network Recognton of Identfers from Shng Contaner Images Usng uzzy Bnarzaton and Enhanced uzzy Neural Networ Kwang-Bae Km Det. of Comuter Engneerng, Slla Unversty, Korea gbm@slla.ac.r Abstract. In ths aer, we

More information

Risk Assessment Using Functional Modeling based on Object Behavior and Interaction

Risk Assessment Using Functional Modeling based on Object Behavior and Interaction Rsk Assessment Usng Functonal Modelng based on Object Behavor and Interacton Akekacha Tangsuksant, Nakornth Promoon Software Engneerng Lab, Center of Ecellence n Software Engneerng Deartment of Comuter

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

Advanced LEACH: A Static Clustering-based Heteroneous Routing Protocol for WSNs

Advanced LEACH: A Static Clustering-based Heteroneous Routing Protocol for WSNs Advanced LEACH: A Statc Clusterng-based Heteroneous Routng Protocol for WSNs A. Iqbal 1, M. Akbar 1, N. Javad 1, S. H. Bouk 1, M. Ilah 1, R. D. Khan 2 1 COMSATS Insttute of Informaton Technology, Islamabad,

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

USEFUL AUTHENTICATION MECHANISM FOR IEC BASED SUBSTATIONS

USEFUL AUTHENTICATION MECHANISM FOR IEC BASED SUBSTATIONS USEFUL AUTHENTICATION MECHANISM FOR IEC 61850-BASED SUBSTATIONS Nastaran Abar M.H.Yaghmaee Davod Noor S.Hedaat Ahbar abar.nastaran@gmal.com yaghmaee@eee.org Hed_lan@yahoo.com ABSTRACT By ncreasng the use

More information

A Novel TCP with Dynamic Burst-Contention Loss Notification over OBS Networks

A Novel TCP with Dynamic Burst-Contention Loss Notification over OBS Networks A Novel TCP wth Dynamc Burst-Contenton Loss Notfcaton over OB Networks Basem hhada 1 and Pn-Han Ho 1, 1 D. R. Chraton chool of Comuter cence, Unversty of Waterloo, Waterloo, Canada Deartment of Electrcal

More information

Contour Error of the 3-DoF Hydraulic Translational Parallel Manipulator. Ryszard Dindorf 1,a, Piotr Wos 2,b

Contour Error of the 3-DoF Hydraulic Translational Parallel Manipulator. Ryszard Dindorf 1,a, Piotr Wos 2,b Advanced Materals Research Vol. 874 (2014) 57-62 Onlne avalable snce 2014/Jan/08 at www.scentfc.net (2014) rans ech Publcatons, Swtzerland do:10.4028/www.scentfc.net/amr.874.57 Contour Error of the 3-DoF

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 35, NO. 3, MARCH

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 35, NO. 3, MARCH IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 35, NO. 3, MARCH 07 7 A Game Theoretc Aroach for Dstrbuted Resource Allocaton and Orchestraton of Softwarzed Networks Salvatore D Oro, Student Member,

More information

A Base Station-Coordinated Contention Resolution for IEEE PMP Networks

A Base Station-Coordinated Contention Resolution for IEEE PMP Networks A Base Staton-Coordnated Contenton Resoluton for IEEE 802.6 PMP Networks Wenyan Lu, Weja Ja,2, Wenfeng Du, and Ldong Ln 2 School of Informaton Scence & Engneerng, Central South Unversty, Changsha, 40083,

More information

Performance Evaluation of Multicast Video Streaming via P2P Networking

Performance Evaluation of Multicast Video Streaming via P2P Networking Secal Issue of Internatonal Journal of Comuter Alcatons (0975 8887) on Electroncs, Informaton and Communcaton Engneerng - ICEICE o.4, Dec 20 erformance Evaluaton of Multcast Vdeo Streamng va 2 etworkng

More information

II. RELATED WORK AND BACKGROUND

II. RELATED WORK AND BACKGROUND Comarson of Bluetooth Interconnecton Methods usng BlueProbe Sewook Jung, Alexander Chang, and Maro Gerla Deartment of Comuter Scence Unversty of Calforna, Los Angeles {sewookj, acmchang, gerla}@cs.ucla.edu

More information

Motivation. EE 457 Unit 4. Throughput vs. Latency. Performance Depends on View Point?! Computer System Performance. An individual user wants to:

Motivation. EE 457 Unit 4. Throughput vs. Latency. Performance Depends on View Point?! Computer System Performance. An individual user wants to: 4.1 4.2 Motvaton EE 457 Unt 4 Computer System Performance An ndvdual user wants to: Mnmze sngle program executon tme A datacenter owner wants to: Maxmze number of Mnmze ( ) http://e-tellgentnternetmarketng.com/webste/frustrated-computer-user-2/

More information

QoS-Based Service Provision Schemes and Plan Durability in Service Composition

QoS-Based Service Provision Schemes and Plan Durability in Service Composition QoS-Based Servce Provson Schemes and Plan Durablty n Servce Comoston Koramt Pchanaharee and Twtte Senvongse Deartment of Comuter Engneerng, Faculty of Engneerng, Chulalongkorn Unversty Phyatha Road, Pathumwan,

More information

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated.

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated. Some Advanced SP Tools 1. umulatve Sum ontrol (usum) hart For the data shown n Table 9-1, the x chart can be generated. However, the shft taken place at sample #21 s not apparent. 92 For ths set samples,

More information

Speed of price adjustment with price conjectures

Speed of price adjustment with price conjectures Seed of rce adustment wh rce conectures Mchael Olve Macquare Unversy, Sydney, Australa Emal: molve@efs.mq.edu.au Abstract We derve a measure of frm seed of rce adustment that s drectly nversely related

More information

Analytic Evaluation of Quality of Service for On-Demand Data Delivery

Analytic Evaluation of Quality of Service for On-Demand Data Delivery Analytc Evaluaton of Qualty of Servce for On-Demand Data Delvery Hongfe Guo Haonan Tan ( guo@cs.wsc.edu) (haonan@cs.wsc.edu) Abstract Qualty of servce (QoS) measured as balkng probablty and average watng

More information

HIERARCHICAL METHOD OF INTER-AREA FAST REROUTING

HIERARCHICAL METHOD OF INTER-AREA FAST REROUTING Transort and Telecommuncaton Vol. 8 no. 7 Transort and Telecommuncaton 7 volume 8 no. 55 67 Transort and Telecommuncaton Insttute Lomonosova Rga LV-9 Latva DOI.55/tt-7-5 HIRARCHICAL MTHOD OF INTR-ARA FAST

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

The IBM zenterprise-196 Decimal Floating-Point Accelerator

The IBM zenterprise-196 Decimal Floating-Point Accelerator 2 2th IEEE Symosum on Comuter Arthmetc The IBM zenterrse-96 Decmal Floatng-Pont Accelerator Steven Carlough Adam Collura scarloug@us.bm.com collura@us.bm.com IBM Systems and Technology Grou 2455 South

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Overview. CSC 2400: Computer Systems. Pointers in C. Pointers - Variables that hold memory addresses - Using pointers to do call-by-reference in C

Overview. CSC 2400: Computer Systems. Pointers in C. Pointers - Variables that hold memory addresses - Using pointers to do call-by-reference in C CSC 2400: Comuter Systems Ponters n C Overvew Ponters - Varables that hold memory addresses - Usng onters to do call-by-reference n C Ponters vs. Arrays - Array names are constant onters Ponters and Strngs

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

On the Two-level Hybrid Clustering Algorithm

On the Two-level Hybrid Clustering Algorithm On the Two-level Clusterng Algorthm ng Yeow Cheu, Chee Keong Kwoh, Zongln Zhou Bonformatcs Research Centre, School of Comuter ngneerng, Nanyang Technologcal Unversty, Sngaore 639798 ezlzhou@ntu.edu.sg

More information

METHODOLOGY FOR CAPACITY CALCULATION IN RAILWAY STATIONS USED IN IS KANGO

METHODOLOGY FOR CAPACITY CALCULATION IN RAILWAY STATIONS USED IN IS KANGO METHODOLOGY FOR CAPACITY CALCULATIO I RAILWAY STATIOS USED I IS KAGO Petr Veselý Summary: Ths aer deals wth desgn of methodology for ralway staton caacty assessment that s n an exermental stage wthn the

More information

Multilayer Neural Networks and Nearest Neighbor Classifier Performances for Image Annotation

Multilayer Neural Networks and Nearest Neighbor Classifier Performances for Image Annotation (IJACSA) Internatonal Journal of Advanced Comuter Scence and Alcatons, Vol. 3, No. 11, 01 Multlayer Neural Networs and Nearest Neghbor Classfer erformances for Image Annotaton Mustaha OUJAOURA Laboratory

More information

Environmental Modelling & Software

Environmental Modelling & Software Envronmental Modellng & Software 90 (2017) 68e77 Contents lsts avalable at ScenceDrect Envronmental Modellng & Software ournal homeage: www.elsever.com/locate/envsoft Addng satal flexblty to source-recetor

More information

Advances. Photometric Stereo

Advances. Photometric Stereo Advances n Photometrc tereo uggero Pntus Tutor Prof. assmo Vanz Contents ) ntroducton g.3 ) mage formaton and reflectance ma g.5 3) Changng from two to four lghts g. 4) Basc theory gradent extracton g.

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Available online at ScienceDirect. Procedia Computer Science 94 (2016 )

Available online at  ScienceDirect. Procedia Computer Science 94 (2016 ) Avalable onlne at www.scencedrect.com ScenceDrect Proceda Comuter Scence 94 (2016 ) 176 182 The 13th Internatonal Conference on Moble Systems and Pervasve Comutng (MobSPC 2016) An Effcent QoS-aware Web

More information

Halmstad University Post-Print

Halmstad University Post-Print Halmstad Unversty Post-Prnt Admsson Control for Swtched Realtme Ethernet Schedulng Analyss versus etwor Calculus Xng Fan and Magnus Jonsson.B.: When ctng ths wor cte the orgnal artcle. Orgnal Publcaton:

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage

A Novel Efficient Remote Data Possession Checking Protocol in Cloud Storage Ths artcle has been acceted for ublcaton n a future ssue of ths journal, but has not been fully edted. Content may change ror to fnal ublcaton. Ctaton nformaton: DOI 10.1109/TIFS.2016.2601070, IEEE Transactons

More information

SOFT COMPUTING OPTIMIZER FOR INTELLIGENT CONTROL SYSTEMS DESIGN: THE STRUCTURE AND APPLICATIONS

SOFT COMPUTING OPTIMIZER FOR INTELLIGENT CONTROL SYSTEMS DESIGN: THE STRUCTURE AND APPLICATIONS SOFT COMPUTING OPTIMIZER FOR INTELLIGENT CONTROL SYSTEMS DESIGN: THE STRUCTURE AND APPLICATIONS Sergey A. PANFILOV, Ludmla V. LITVINTSEVA, Ilya S. ULYANOV, Kazuk TAKAHASHI, Sergue V. ULYANOV YAMAHA Motor

More information

A Saturation Binary Neural Network for Crossbar Switching Problem

A Saturation Binary Neural Network for Crossbar Switching Problem A Saturaton Bnary Neural Network for Crossbar Swtchng Problem Cu Zhang 1, L-Qng Zhao 2, and Rong-Long Wang 2 1 Department of Autocontrol, Laonng Insttute of Scence and Technology, Benx, Chna bxlkyzhangcu@163.com

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

View-Dependent Multiresolution Representation for a Height Map

View-Dependent Multiresolution Representation for a Height Map Internatonal Journal of Innovaton, Management and echnology, Vol. 4, No. 1, February 013 Vew-Deendent Multresoluton Reresentaton for a Heght Ma Yong H. Chung, Won K. Hwam, Dae S. Chang, Jung-Ju Cho, and

More information

Ontology based data warehouses federation management system

Ontology based data warehouses federation management system Ontolog based data warehouses federaton management sstem Naoual MOUHNI 1, Abderrafaa EL KALAY 2 1 Deartment of mathematcs and comuter scences, Unverst Cad Aad, Facult of scences and technologes Marrakesh,

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Lecture Note 08 EECS 4101/5101 Instructor: Andy Mirzaian. All Nearest Neighbors: The Lifting Method

Lecture Note 08 EECS 4101/5101 Instructor: Andy Mirzaian. All Nearest Neighbors: The Lifting Method Lecture Note 08 EECS 4101/5101 Instructor: Andy Mrzaan Introducton All Nearest Neghbors: The Lftng Method Suose we are gven aset P ={ 1, 2,..., n }of n onts n the lane. The gven coordnates of the -th ont

More information

A Structure Preserving Database Encryption Scheme

A Structure Preserving Database Encryption Scheme A Structure Preservng Database Encryton Scheme Yuval Elovc, Ronen Wasenberg, Erez Shmuel, and Ehud Gudes Ben-Guron Unversty of the Negev, Faculty of Engneerng, Deartment of Informaton Systems Engneerng,

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Greedy Technique - Definition

Greedy Technique - Definition Greedy Technque Greedy Technque - Defnton The greedy method s a general algorthm desgn paradgm, bult on the follong elements: confguratons: dfferent choces, collectons, or values to fnd objectve functon:

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)

More information

Making Name-Based Content Routing More Efficient than Link-State Routing

Making Name-Based Content Routing More Efficient than Link-State Routing Makng Name-Based Content Routng More Effcent than Lnk-State Routng Ehsan Hemmat and J.J. Garca-Luna-Aceves, Comuter Engneerng Deartment, UC Santa Cruz, Santa Cruz, CA 95064 PARC, Palo Alto, CA 94304 {

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

I 2 C: A Holistic Approach to Prolong the Sensor Network Lifetime

I 2 C: A Holistic Approach to Prolong the Sensor Network Lifetime : A Holstc Aroach to Prolong the Sensor Network Lfetme Yang Peng, Z L, Da Qao, and Wensheng Zhang Iowa State Unversty, Ames, IA 511 {yangeng, zl, da, wzhang}@astate.edu Abstract We resent a novel holstc

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Harvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6)

Harvard University CS 101 Fall 2005, Shimon Schocken. Assembler. Elements of Computing Systems 1 Assembler (Ch. 6) Harvard Unversty CS 101 Fall 2005, Shmon Schocken Assembler Elements of Computng Systems 1 Assembler (Ch. 6) Why care about assemblers? Because Assemblers employ some nfty trcks Assemblers are the frst

More information

Semi-Supervised Biased Maximum Margin Analysis for Interactive Image Retrieval

Semi-Supervised Biased Maximum Margin Analysis for Interactive Image Retrieval IP-06850-00.R3 Sem-Suervsed Based Maxmum Margn Analyss for Interactve Image Retreval Lnng Zhang,, Student Member, IEEE, Lo Wang, Senor Member, IEEE and Wes Ln 3, Senor Member, IEEE School of Electrcal

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Bayesian Networks: Independencies and Inference. What Independencies does a Bayes Net Model?

Bayesian Networks: Independencies and Inference. What Independencies does a Bayes Net Model? Bayesan Networks: Indeendences and Inference Scott Daves and Andrew Moore Note to other teachers and users of these sldes. Andrew and Scott would be delghted f you found ths source materal useful n gvng

More information

A Classifier Ensemble of Binary Classifier Ensembles

A Classifier Ensemble of Binary Classifier Ensembles Internatonal Journal of Electroncs Communcaton and Comuter Technology (IJECCT) Volume 1 Issue 1 Setember 2011 A Classfer Ensemble of Bnary Classfer Ensembles Hamd Parvn Comuter Engneerng, Islamc Azad Unversty,

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Region Segmentation Readings: Chapter 10: 10.1 Additional Materials Provided

Region Segmentation Readings: Chapter 10: 10.1 Additional Materials Provided Regon Segmentaton Readngs: hater 10: 10.1 Addtonal Materals Provded K-means lusterng tet EM lusterng aer Grah Parttonng tet Mean-Shft lusterng aer 1 Image Segmentaton Image segmentaton s the oeraton of

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION 24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and

More information

WEB MINING BASED OBJECTIVE METRICS FOR MEASURING WEB SITE NAVIGABILITY

WEB MINING BASED OBJECTIVE METRICS FOR MEASURING WEB SITE NAVIGABILITY WEB MINING BASED OBJECTIVE METRICS FOR MEASURING WEB SITE NAVIGABILITY Desgn Scence Track Xao Fang* College of Busness Admnstraton Unversty of Toledo Toledo, Oho xao.fang@utoledo.edu Paul J. Hu* School

More information

Needed Information to do Allocation

Needed Information to do Allocation Complexty n the Database Allocaton Desgn Must tae relatonshp between fragments nto account Cost of ntegrty enforcements Constrants on response-tme, storage, and processng capablty Needed Informaton to

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Uncertainty operations with Statool. Jianzhong Zhang. A thesis submitted to the graduate faculty

Uncertainty operations with Statool. Jianzhong Zhang. A thesis submitted to the graduate faculty Uncertanty oeratons wth Statool by Janzhong Zhang A thess submtted to the graduate faculty n artal fulfllment of the requrements for the degree of MASTER OF SCIECE Maor: Comutng Engneerng Program of Study

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Energy and Throughput Optimized, Cluster Based Hierarchical Routing Algorithm for Heterogeneous Wireless Sensor Networks

Energy and Throughput Optimized, Cluster Based Hierarchical Routing Algorithm for Heterogeneous Wireless Sensor Networks Int. J. Communcatons Networ and System Scences 0 4 335-344 do:0.436/cns.0.45038 Publshed Onlne May 0 (htt://www.scrp.org/ournal/cns) Energy and Throughut Otmzed Cluster Based Herarchcal Routng Algorthm

More information

A MULTILEVEL DECISION MAKING MODEL FOR THE SUPPLIER SELECTION PROBLEM IN A FUZZY SITUATION

A MULTILEVEL DECISION MAKING MODEL FOR THE SUPPLIER SELECTION PROBLEM IN A FUZZY SITUATION OPERATIONS RESEARCH AND DECISIONS No. 4 2017 DOI: 10.5277/ord170401 Ahmad Yusuf ADHAMI 1 Syed Mohd MUNEEB 1 Mohammad Asm NOMANI 2 A MULTILEVEL DECISION MAKING MODEL FOR THE SUPPLIER SELECTION PROBLEM IN

More information

E-DEEC- Enhanced Distributed Energy Efficient Clustering Scheme for heterogeneous WSN

E-DEEC- Enhanced Distributed Energy Efficient Clustering Scheme for heterogeneous WSN 21 1st Internatonal Conference on Parallel, Dstrbuted and Grd Comutng (PDGC - 21) E-DEEC- Enhanced Dstrbuted Energy Effcent Clusterng Scheme for heterogeneous WSN Parul San Deartment of Comuter Scence

More information