Enhancing MPLS QoS routing algorithms by using the Network Protection Degree paradigm. *

Size: px
Start display at page:

Download "Enhancing MPLS QoS routing algorithms by using the Network Protection Degree paradigm. *"

Transcription

1 Enhancng MPLS QoS routng algorthms by usng the Networ Protecton Degree paradgm. * Euseb Calle, Jose L Marzo, Anna Urra, Pere Vla Broadband Comm. and Dstrbuted Systems Insttut d Informàtca aplcacons (IA) Unverstat de Grona, 77 Grona, SPAIN e-mal: {euseb, marzo, aurra, perev}@ea.udg.es Abstract- IP based networs stll do not have the requred degree of relablty requred by new multmeda servces, achevng such relablty wll be crucal n the success or falure of the new Internet generaton. Most of exstng schemes for QoS routng do not tae nto consderaton parameters concernng the qualty of the protecton, such as pacet loss or restoraton tme. In ths paper, we defne a new paradgm to develop new protecton strateges for buldng relable MPLS networs, based on what we have called the Networ Protecton Degree (NPD). Ths NPD conssts of an a pror evaluaton, the Falure Sensblty Degree (FSD), whch provdes the falure probablty and an a posteror evaluaton, the Falure Impact Degree (FID), to determne the mpact on the networ n case of falure. Havng mathematcal formulated these components, we pont out the most relevant components. Expermental results demonstrate the benefts of the utlzaton of the NPD, when used to enhance some current QoS routng algorthms to offer a certan degree of protecton. I. INTRODUCTION New networ technology enables ncreasngly hgher volumes of nformaton to be carred. Varous dfferent types of msson-crtcal, hgher-prorty traffc are now transported over these networs. In ths scenaro, when offerng better qualty of servce, the consequences of a fault n a ln or node become more pronounced. A new concept of qualty of protecton s requred. Networ relablty can be provded through dfferent fault management mechansms appled at dfferent networ levels and tme scales. Although most concepts and methods dscussed n ths paper are applcable to dfferent networ technologes, whch mplement the logcal path paradgm, our wor focuses manly on MultProtocol Label Swtchng (MPLS) networs. MPLS fault restoraton mechansms usually establsh bacup Label Swtch Paths (LSPs). Wth these bacups, traffc can always be re-routed when a falure occurs. MPLS also provdes sutable fault detecton and fault recovery actuaton, whch allow effectve utlzaton of bacup paths. ([], [2] and [7]). A crucal aspect n the development of a fault management system s the creaton and routng of bacup paths. Several schemes have been proposed ([3], [4], and [5]) for routng new LSPs whch guarantee certan QoS parameters (such as resource utlzaton or mnmzng the request rejecton rato). However, most of these schemes do not tae nto consderaton other aspects, such as networ falure probablty, or parameters concernng the qualty of the protecton, such as pacet loss or restoraton tme. We wll dscuss networ protecton, nvolvng the creaton of fast and sutable recovery mechansms, n the context of these parameters and whch of them have most nfluence. Wth ths am we propose new concepts for calculatng a Networ Protecton Degree (NPD), such as the Falure Sensblty Degree (FSD) or the Falure Impact Degree (FID). A mathematcal formalzaton s developed for each concept and several experments are presented to support these formulatons. Ths paper s organzed as follows: n Secton II, the new Networ Protecton Degree concept s presented and formalzed. In Secton III and IV, the formulatons, supported by experments are dscussed. Fnal Secton summarzes and concludes the paper. II. NETWORK PROTECTION DEGREE In ths secton, we analyze the man components whch defne the Networ Protecton Degree (NPD). There are two man components of NPD: the Falure Senstvty Degree (FSD) and the Falure Impact Degree (FID). The FSD concerns the statstcal analyss of networ falure (ths s an a pror analyss). On the other hand, the FID evaluates the mpact on the networ when the falure occurs (ths s an a posteror analyss). In ths wor, FID s expressed n terms of well-nown parameters such as pacet loss and recovery tme. * Ths wor has been partally supported by Specal Acton (Spansh Mnstry Scence and Technology)TIC22-5-E. GLOBECOM /3/$7. 23 IEEE Authorzed lcensed use lmted to: UNIVERSITAT DE GIRONA. Downloaded on September 7, 29 at 4:39 from IEEE Xplore. Restrctons apply.

2 In a real networ, several technologes coexst: dfferent wrng (or dfferent physcal layers) and dfferent types of nodes (dfferent provders, old and new equpment, etc.) all worng together. Ths means that the actual probablty of falure of any one of these elements s sgnfcantly dfferent from any of the others. Although t s mpossble n practce to determne whch partcular segment n a networ wll fal and when, the probablty of falure can be calculated. A networ operator can apply predcton technques based on fault statstcs. Eventually, a probablty of falure can be explctly assgned, manually, n order to decde upon a specfc degree of protecton. We wll refer to ths probablty as Ln Falure Probablty (LFP). In case of a new segment beng set up, where there s no nowledge concernng falures, a hgh value LFP would ntally be assgned. After a certan amount of normal functonng (no faults) a set of statstcal nformaton s obtaned and the ntal LFP can be updated (hopefully decreased) to a more realstc value. The mechansms and methods for computng all the falure probabltes (LFPs) n a networ are beyond the scope of ths wor. In the wor we present here, we assume that nowledge of these probabltes s already nown or readly avalable. Moreover, although ther values may vary n tme, ths nformaton s assumed to be stable. A way to evaluate the FSD would be a useful tool for networ provders, helpng them to set the desred degree of protecton for ther customers and allowng them to guarantee QoS n terms of relablty and avalablty (dependng on the SLA - Servce Level Agreement). In secton 2. we dscuss usng ths nformaton for calculatng the sensblty to falure of an LSP. On the other hand, the mpact to the networ n the event of ths path falng can be evaluated n terms of recovery delay and pacet loss. The term Recovery Delay (T REC ) s defned as the perod of tme between the fault and the traffc restoraton to the correspondng bacup path. Pacet Loss (P LS ) s defned as the total lost pacets durng the T REC. Therefore, the Falure Impact Degree (FID) s calculated based on T REC and P LS. In the followng sectons, a method for calculatng FID and a study of the crucal factors when usng bacup protecton mechansms are presented. Ths provdes us wth a good nowledge about the segments of the networ whch are the most crtcal n case of falure. 2. Falure Sensblty Degree The Falure Sensblty Degree (FSD) expresses the total probablty of falure of the networ. LSPs can cross through dfferent lns each wth ts own Ln Falure Probablty (LFP). Therefore, we assume n ths wor that all LFP s are nown (by calculaton or heurstcally) and they are also ndependent of each other. These values are normally very small; we assume that LFP<<. A LSP fals f any segment (.e., an ndvdual ln or a combnaton of nodes and lns) along the path fals. However, t s easer to evaluate the nverse probablty,.e., the probablty that all the lns nvolved wor fne. Let consder the nverse probablty of ln falure as LFP -., (.e. the probablty that the ln wors fne). Therefore, the overall (LSP) probablty of no-falure (the nverse of a LSP falure probablty LSP_FP) s: LSP _ FP LFP ( LFP Number of lns of the LSP () By smplfyng all products and powers of LFP (as they are very small values by hypothess) the product of ths term s transformed nto the followng: LSP _ FP Number of lns of the LSP (2) But agan, the LSP Falure Probablty can be calculated as the nverse of LSP_FP -, therefore: LSP_ FP LSP_ FP Number of lns of the LSP (3) As expected, the total probablty of falure of a LSP can be approxmated by the sum of ln falure probabltes. It s also useful to assgn a bnary value to each segment to now whenever a ln should be protected. Ths s defned as the Ln Protecton Requrements (LPR). Ths can be easly obtaned by assgn LPR to those lns wth LFP and LPR wth LFP >. Ths allows us an easy calculaton of the total LSP Number of Lns to Protect (LSP_NLP). Hence, LSP_NLP s calculated as: Number of lns of the LSP (4) In consequence, FSD can be defned as an array of the Falure Probablty of all current LSPs (LSP_FP) n the networ (formula (5)), or as an array Number of Lns to be Protected per LSP (LSP_NLP) (formula (6)). FSD_FP (LSP_FP, LSP_FP 2, LSP_FP N ) (5) FSD_NLP (LSP_NLP, LSP_NLP 2, LSP_NLP N ) (6) Where: N Number of LSPs n the networ ( LFP ) LFP LSP _ NLP ( LPR LFP) LFP ) GLOBECOM /3/$7. 23 IEEE Authorzed lcensed use lmted to: UNIVERSITAT DE GIRONA. Downloaded on September 7, 29 at 4:39 from IEEE Xplore. Restrctons apply.

3 These arrays allow defnng dfferent strateges to evaluate the FSD. Wth (5) the number of LSPs out of an specfc LSP_FP can be computed. Wth (6) we can determne, not only a falure probablty expressed on the average of the number of lns to be protected per LSP, but the protecton requrements (number of lns wth bacup requrements). In secton IV several experments to evaluate ths second opton are carred out. 2.2 Falure Impact Degree (FID) In ths Secton, we show how we calculate the Falure Impact Degree (FID). As mentoned above, ths metrc concerns delays and pacet loss n case of falure. Let us start wth delays. It s well nown that any protecton mechansm based on the establshment of bacup paths follows a set of steps for recoverng faults. Each step needs a certan amount of tme,.e., the Recovery Delay (Tme of Recovery T REC ), to carry on wth the correspondng functons. Ths tme conssts of the followng: Tme for detectng the fault T DET (for nstance a sgnal from lower levels). Notfcaton tme T NOT to nform (.e, send a message to) the node responsble for swtchover. Tme for bacup setup, routng and sgnalng T BE. Tme for traffc swtchover T SW, from actve path to bacup path. Therefore, the T REC can be evaluated by smple addton, as the followng expresson shows: T REC T DET + T NOT + T BE + T SW (7) The Pacet Loss (P LS ) s proportonal to ths T REC and to the transmsson Rate R TR [8]. The pacet loss n the faulty ln (P FL ), that s to say, the pacets lost when the ln that was carryng them faled, should also be added to the equaton. The resultng expresson s: P LS R TR * T REC + P FL (8) Therefore, t can be sad that the Falure Impact Degree s a functon, g, whch depends on the pacet loss and recovery tme: FID g (T REC, P LS ) (9) Fg shows the most common used MPLS protecton methods (global and local bacups). The advantages and dsadvantages of these, and other, mechansms are wdely dscussed n the lterature [], [2],and [3]. In our prevous wor [6], and [7], Pacet Loss and Recovery Delay are consdered as well as pacet reorderng and resource consumpton. Bascally, Local Bacups offers a soluton respect to Pacet Loss and Recovery Tme problems of the Global Bacup. Nevertheless, when the number of lns to protect n the path s elevated Local Bacups are not sutable, due to elevated resource consumpton. In order to formulate FID for each protecton method we have assumed the followng smplfcatons: Ingress node Node Global Bacup path Worng path D (,a) Node a Local Bacup Node b Fg.. Global and Local LSP Bacup Paths. Egress Node Node e ) The fault detecton tme, T DET, depends on several factors (such as the level of the networ where the fault s detected, or the performance of the swtch components). However, these aspects affect all protecton mechansms equally. Moreover, the swtchover tme, T SW, s neglgble wth respect to the notfcaton tme, T NOT, and to the bacup establshment tme, T BE. For the purpose of smplfcaton, they have not been consdered n FID formulaton. 2) Most of currently proposals consder nevtable the pacet loss at the faled ln P FL. However, there are some recent approaches that propose the utlzatons of bufferng and taggng technques to avod such loss [9]. Whether or not these technques are used, n both cases pacet loss s stll neglgble n relaton to the total amount of pacet loss, hence they are not consdered n ths wor 3) The most sgnfcant elements, n terms of delay, of Pacet Loss and the Recovery Delay (dervng from (4) and (5)) are the notfcaton tme, T NOT, and the bacup establshment tme, T BE. However, further analyss of T BE mples a better analyss of the dverse routng algorthms because T BE s proportonal to the tme needed to get a new route. The frst element to loo at s T NOT.. T NOT s proportonal to the propagaton tme for the message, T PR, and the dstance from the node where the fault s detected (a-node) to the responsble of the swtchover (-node) (see fg. ). Although ths dstance, D(,a), should be expressed n a real metrc (meters, Km, etc.), D(,a) s n fact expressed n terms of the number of hops for the purposes of smplfcaton. Therefore, the calculaton for fault notfcaton s: T NOT D(,a) * T PR () Then, the FID s obtaned usng (7),(8) and (9): FID f ( D(,a) * T PR, D(,a) * T PR * R TR ) (2) As expected, pacet loss s proportonal to the restoraton tme whch depends on dstance (D(,a) as defned) and on the propagaton tme T PR.. In concluson, the greater the dstance, (or, the greater the propagaton tme), the worse the mpact of a falure s. Reducng the propagaton tme of the fault notfcaton would reduce the mpact. Unfortunately ths depends on the physcal topology whch s, for a gven networ, a statc GLOBECOM /3/$7. 23 IEEE Authorzed lcensed use lmted to: UNIVERSITAT DE GIRONA. Downloaded on September 7, 29 at 4:39 from IEEE Xplore. Restrctons apply.

4 parameter, and therefore dffcult to modfy. Thus, any effort to mnmze the mpact of falure should be amed at tryng to reduce the dstance from the node where the fault occurs and the node, whch carres out the swtchover. III. NETWORK PROTECTION DEGREE APPLICATION. In the prevous secton, we showed how we calculated the two components to evaluate the Networ Protecton Degree, NPD: the Falure Sensblty Degree, FSD (an a pror component) and the Falure Impact Degree, FID (an a posteror component). The protecton Degree can be expressed as a functon, f, of these two components: NPD f (FSD, FID) (3) We beleve NPD wll allow developers to create new or mprove current QoS routng strateges. In [4] some QoS routng algorthms are defned and analyzed, such as Wdest Shortest Path (WSP) or Shortest Wdest Path (SWP). Both are based on resource optmzaton and load balancng. Recently, more complex approaches have appeared. [5], and [6], focused on resource optmzaton and the mnmzaton of rejected requests. However, most of these algorthms do not consder networ protecton, at least not as a prorty. By usng the calculaton of NPD, some of these methods can easly be enhanced. For nstance, n order to enhance WSP we propose three new routng algorthms to add certan protecton parameters n the route selecton. Twce of them taes n consderaton FSD formulaton explaned n secton 2., n order to acheve LSPs wth less falure probablty and protecton requrements. Wth the am of consderng the FID another routng algorthm ntegratng falure probabltes and dstances (D(,a)) has been developed. In all these algorthms a pre-computaton of a -WSP algorthm s developed. Over the set of possble LSPs dfferent protecton strateges are appled: ) PWSP_FP, Protected WSP consderng the Falure Probabltes; the LSP wth the lowest falure probablty LSP_FP s selected. S S D S2 S D D4 Fg 2. Networ Topology 2 D ) PWSP_NLP, Protected WSP consderng the Number of Lns to Protect;. the LSP wth the lowest Number of LSPs (LSP_NLP) s selected. 3) PWSP_FPD, Protected WSP consderng the Falure Probabltes and Dstances (D(,a). In ths case, the objectve s to reduce not only the falure probablty, but the falure mpact (mnmzng the dstance D(,a), as explaned n secton 2.2). Each ln of a LSP s weghted by the product of the dstance D(,a) by the LFP. Wth the total sum of these values, the LSP wth the lowest value s selected. For all these algorthms, f there are several such paths wth the same characterstcs, one of them s randomly selected. IV. EXPERIMENTAL CALCULATION OF NPD. In ths secton, the NPD s evaluated n two networ scenaros. For these experments we used the same topology, (see Fg. 2), as n several other studes such as [5], or [6]. The capacty of the lns s 2 and 48 (bolded lnes) unts. But these capactes are scaled by, n order to experment wth thousand of LSPs. Each ln s bdrectonal (.e., t acts le two undrectonal lns of half of that capacty). There are 5 nodes and 28 lns. There are four Ingress-Egress node pars (see fg.2). Ln Falure Probabltes (LFPs) are assgned accordng to fgure 2. There are lns to be protected, whch represents a 4.7 percent of the networ. In all smulaton experments descrbed n ths paper, LSP requests arrved randomly, at the same average rate for all node pars. We assume that all lns are long lve (.e., statc case ). For each experment, 2 trals wth 3 LSP demands were conducted. The bandwdth allocaton for the LSPs s unformly dstrbuted between, 2 and 3 unts. Results have been obtaned by mplementng the QoS routng algorthm proposed n prevous secton. Case a: Number of lns to be protected: fgure 3.a) shows an analyss of the average of the number of lns to be protected (NLP) per LSP. Charts show that all routng schemes wth protecton (PWSP algorthms) have smlar NLP results. In the case of applyng a WSP, the NLP per LSP sharply ncreases (about 35 % more). Ths leads us to state that: a) WSP routng ncreases the probablty of falure (due to a major number of lns wth a certan falure probablty), and b) t ncreases the resource consumpton f these lns are protected wth bacups. Case b: Falure mpact degree: In ths case we have analyzed the reducton n the FID, based on dstance (D(,a)). Fg 3.b) shows the dstrbuton of LSPs wth lns to be protected at dfferent dstances. Results, as expected, GLOBECOM /3/$7. 23 IEEE Authorzed lcensed use lmted to: UNIVERSITAT DE GIRONA. Downloaded on September 7, 29 at 4:39 from IEEE Xplore. Restrctons apply.

5 NLP per LSP Number of LSP (N) a) Tral Number b) Dstance 8,8 Number of LSP (N) c) Tral Number Request Rejecton Rato,6,4,2,,8, d) Tral Number WSP PWSP_NLP PWSP_FP PWSP_FPD Fg. 3. a) Number of lns to be protected. b) Falure mpact Degree Analyss. c) Falure mpact Degree Analyss. d) Request Rejecton Raton shows that PWSP_FPD has the best performance, allocatng the major number of lns to be protected at dstance. Agan, WSP shows the worst behavor dstrbutng a bg number of lns to be protected at dstances D(,a)>. Case c: Optmzng the Networ Falure Degree: Fg. 3 shows the number of LSPs out of a pre-set NPD threshold. The NPD (formula [3]) s evaluated n terms of notfcaton dstances (formula [2]) gvng the FID value and falure probabltes (formula [5]) to evaluate the FSD. We have computed those LSPs wth dstances D(,a)> (large FID) and LSP_FP>2-4 (large FSD). In ths case the best opton, once agan, s the PWSP_FPD. However PWSP_NLP and PWSP_FP shows a smlar protecton degree better than the WSP. Case d: Request Rejecton Rato: Cases A, B and C have demonstrated that PWSP mproves the NPD, expressed by the FSD and the FID. However t s mportant to remar that these algorthms do not deterorate the number of requests accepted. Fgure 3.d) shows that all these algorthms eep a Request Rejecton Degree over -5%. Although, n ths case, the best performance s offered by the WSP. CONCLUSIONS In ths paper, we have proposed a new mechansm for evaluatng the Networ Protecton Degree (NPD), whch has two components: the Falure Sensblty Degree (FSD) and the Falure Impact Degree (FID). Experments have demonstrated the benefts of NPD applcaton when used to mprove the well-nown routng algorthm WSP, whch has been enhanced becomng a Protected WSP, PWSP n our study. Ths leads to a reducton n the FSD and FID, n terms of a reducton n the number of protected lns (NPL) and ts probablty of falure. Besdes reducng the NPL, the resource consumpton when usng local bacups s reduced. PWSP algorthms also reduce the mpact n case of falure by decreasng the number of LSPs wth crtcal (large) dstances D(, a) and falure probabltes. In short, the presented formalzaton of the NPD paradgm should allow networ and servce provders to apply better QoS routng strateges that wll mprove the relablty of ther networs. REFERENCES [] Changcheng Huang, Vshal Sharma, Ken Owens, Srnvas Maam, "Buldng relable MPLS Networs usng a path protecton mechansm", IEEE Communcatons Magazne, Mar 22 [2] D. Hasn, R. Krshnan "A Method for Settng an Alternatve Label Swtched Paths to Handle Fast Reroute". (Wor n progress) Internet Draft. Nov 2. [3] R. Guern, D. Wllams, A. Orda. QoS Routng Mechansms and OSPF Extensons. Proceedngs of IEEE Globecom 997. [4] M. Kodalam, T.Lashman. "Mnmum Interference Routng wth Applcatons to MPLS Traffc Engneerng". IEEE Infocom 2. [5] S. Subhash, M. Waldvogel, P. Warhede. "Profle-Based Routng: A New Framewor for MPLS Traffc Engneerng". QofIS'. [6] J. L. Marzo, E.Calle, C. Scoglo, T. Anjal "Addng QoS Protecton n Order to Enhance MPLS QoS Routng". To appear n ICC 23. [7] J. L Marzo, E. Calle, C. Scoglo, T. Anjal "QoS On-Lne Routng and MPLS Multlevel Protecton: a Survey" to appear n IEEE Communcatons Magazne, October 23. [8] L. Hundessa, J. Domngo-Pascual Relable and Fast Reroutng Mechansms for a Protected Label Swtched Path Proceedngs of Globecom 22. GLOBECOM /3/$7. 23 IEEE Authorzed lcensed use lmted to: UNIVERSITAT DE GIRONA. Downloaded on September 7, 29 at 4:39 from IEEE Xplore. Restrctons apply.

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany

More information

Research Article. ISSN (Print) s k and. d k rate of k -th flow, source node and

Research Article. ISSN (Print) s k and. d k rate of k -th flow, source node and Scholars Journal of Engneerng and Technology (SJET) Sch. J. Eng. Tech., 2015; 3(4A):343-350 Scholars Academc and Scentfc Publsher (An Internatonal Publsher for Academc and Scentfc Resources) www.saspublsher.com

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Integrated Congestion-Control Mechanism in Optical Burst Switching Networks

Integrated Congestion-Control Mechanism in Optical Burst Switching Networks Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE GLOBECOM 2005 proceedngs Integrated Congeston-Control Mechansm n Optcal Burst

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Convolutional interleaver for unequal error protection of turbo codes

Convolutional interleaver for unequal error protection of turbo codes Convolutonal nterleaver for unequal error protecton of turbo codes Sna Vaf, Tadeusz Wysock, Ian Burnett Unversty of Wollongong, SW 2522, Australa E-mal:{sv39,wysock,an_burnett}@uow.edu.au Abstract: Ths

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Efficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model. Eiji Oki May 28, 2009 The University of Electro-Communications

Efficient Load-Balanced IP Routing Scheme Based on Shortest Paths in Hose Model. Eiji Oki May 28, 2009 The University of Electro-Communications Effcent Loa-Balance IP Routng Scheme Base on Shortest Paths n Hose Moel E Ok May 28, 2009 The Unversty of Electro-Communcatons Ok Lab. Semnar, May 28, 2009 1 Outlne Backgroun on IP routng IP routng strategy

More information

A HEURISTIC METHOD FOR RELIABILITY REDUNDANCY OPTIMIZATION OF FLOW NETWORKS

A HEURISTIC METHOD FOR RELIABILITY REDUNDANCY OPTIMIZATION OF FLOW NETWORKS Kumar Pardeep and Chaturved D.K., Pahua G.L. - A HEURISTIC METHOD FOR RELIABILITY REDUNDANCY OPTIMIZATION OF FLOW NETWORKS A HEURISTIC METHOD FOR RELIABILITY REDUNDANCY OPTIMIZATION OF FLOW NETWORKS Kumar

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Availability and QoS Performance Evaluation of Public IP Networks Tivadar Jakab 1, Gábor Horváth 1, Rozália Konkoly 2, Éva Csákány 2 1

Availability and QoS Performance Evaluation of Public IP Networks Tivadar Jakab 1, Gábor Horváth 1, Rozália Konkoly 2, Éva Csákány 2 1 Avalablty and QoS Performance Evaluaton of Publc IP Networks Tvadar Jakab, Gábor Horváth, Rozála Konkoly, Éva Csákány Department of Telecommuncatons, Budapest Unversty of Technology and Economcs Magyar

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Pricing Network Resources for Adaptive Applications in a Differentiated Services Network

Pricing Network Resources for Adaptive Applications in a Differentiated Services Network IEEE INFOCOM Prcng Network Resources for Adaptve Applcatons n a Dfferentated Servces Network Xn Wang and Hennng Schulzrnne Columba Unversty Emal: {xnwang, schulzrnne}@cs.columba.edu Abstract The Dfferentated

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

MODELING THE RELIABILITY OF INFORMATION MANAGEMENT SYSTEMS BASED ON MISSION SPECIFIC TOOLS SET SOFTWARE

MODELING THE RELIABILITY OF INFORMATION MANAGEMENT SYSTEMS BASED ON MISSION SPECIFIC TOOLS SET SOFTWARE Knowledge Dynamcs MODELING THE ELIABILITY OF INFOMATION MANAGEMENT SYSTEMS BASED ON MISSION SPECIFIC TOOLS SET SOFTWAE Cezar VASILESCU Assocate Professor, egonal Department of Defense esources Management

More information

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION 24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

Regional Load Balancing Circuitous Bandwidth Allocation Method Based on Dynamic Auction Mechanism

Regional Load Balancing Circuitous Bandwidth Allocation Method Based on Dynamic Auction Mechanism ATEC Web of Conferences 76, (8) IFID 8 https://do.org/./matecconf/876 Regonal Load Balancng Crcutous Bandwdth Allocaton ethod Based on Dynamc Aucton echansm Wang Chao, Zhang Dalong, Ran Xaomn atonal Dgtal

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

A Decentralized Lifetime Maximization Algorithm for Distributed Applications in Wireless Sensor Networks

A Decentralized Lifetime Maximization Algorithm for Distributed Applications in Wireless Sensor Networks A Decentralzed Lfetme Maxmzaton Algorthm for Dstrbuted Applcatons n Wreless Sensor Networks Vrgna Pllon, Mauro Franceschell, Lug Atzor, Alessandro Gua Dept. of Electrcal and Electronc Engneerng, Unversty

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Use of Genetic Algorithms in Efficient Scheduling for Multi Service Classes

Use of Genetic Algorithms in Efficient Scheduling for Multi Service Classes Use of Genetc Algorthms n Effcent Schedulng for Mult Servce Classes Shyamale Thlakawardana and Rahm Tafazoll Centre for Communcatons Systems Research (CCSR), Unversty of Surrey, Guldford, GU27XH, UK Abstract

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Game Based Virtual Bandwidth Allocation for Virtual Networks in Data Centers

Game Based Virtual Bandwidth Allocation for Virtual Networks in Data Centers Avaable onlne at www.scencedrect.com Proceda Engneerng 23 (20) 780 785 Power Electroncs and Engneerng Applcaton, 20 Game Based Vrtual Bandwdth Allocaton for Vrtual Networks n Data Centers Cu-rong Wang,

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

An efficient iterative source routing algorithm

An efficient iterative source routing algorithm An effcent teratve source routng algorthm Gang Cheng Ye Tan Nrwan Ansar Advanced Networng Lab Department of Electrcal Computer Engneerng New Jersey Insttute of Technology Newar NJ 7 {gc yt Ansar}@ntedu

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments Comparson of Heurstcs for Schedulng Independent Tasks on Heterogeneous Dstrbuted Envronments Hesam Izakan¹, Ath Abraham², Senor Member, IEEE, Václav Snášel³ ¹ Islamc Azad Unversty, Ramsar Branch, Ramsar,

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Maintaining temporal validity of real-time data on non-continuously executing resources

Maintaining temporal validity of real-time data on non-continuously executing resources Mantanng temporal valdty of real-tme data on non-contnuously executng resources Tan Ba, Hong Lu and Juan Yang Hunan Insttute of Scence and Technology, College of Computer Scence, 44, Yueyang, Chna Wuhan

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Efficient Broadcast Disks Program Construction in Asymmetric Communication Environments

Efficient Broadcast Disks Program Construction in Asymmetric Communication Environments Effcent Broadcast Dsks Program Constructon n Asymmetrc Communcaton Envronments Eleftheros Takas, Stefanos Ougaroglou, Petros copoltds Department of Informatcs, Arstotle Unversty of Thessalonk Box 888,

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

y and the total sum of

y and the total sum of Lnear regresson Testng for non-lnearty In analytcal chemstry, lnear regresson s commonly used n the constructon of calbraton functons requred for analytcal technques such as gas chromatography, atomc absorpton

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

A NEW LOCALIZED NETWORK BASED ROUTING MODEL IN COMPUTER AND COMMUNICATION NETWORKS

A NEW LOCALIZED NETWORK BASED ROUTING MODEL IN COMPUTER AND COMMUNICATION NETWORKS A NEW LOCALIZED NETWORK BASED ROUTING MODEL IN COMPUTER AND COMMUNICATION NETWORKS Abdulbaset H. Mohammad School of Computng, Informatcs and Meda, Unversty of Bradford, Bradford, Unted Kngdom a.h.t.mohammad@bradford.ac.uk

More information

A protocol for mixed-criticality management in switched Ethernet networks

A protocol for mixed-criticality management in switched Ethernet networks A protocol for mxed-crtcalty management n swtched Ethernet networks Olver CROS, Laurent GEORGE Unversté Pars-Est, LIGM / ESIEE, France cros@ece.fr,lgeorge@eee.org Xaotng LI ECE Pars / LACSC, France xaotng.l@ece.fr

More information

Petri Net Based Software Dependability Engineering

Petri Net Based Software Dependability Engineering Proc. RELECTRONIC 95, Budapest, pp. 181-186; October 1995 Petr Net Based Software Dependablty Engneerng Monka Hener Brandenburg Unversty of Technology Cottbus Computer Scence Insttute Postbox 101344 D-03013

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

Explicit Formulas and Efficient Algorithm for Moment Computation of Coupled RC Trees with Lumped and Distributed Elements

Explicit Formulas and Efficient Algorithm for Moment Computation of Coupled RC Trees with Lumped and Distributed Elements Explct Formulas and Effcent Algorthm for Moment Computaton of Coupled RC Trees wth Lumped and Dstrbuted Elements Qngan Yu and Ernest S.Kuh Electroncs Research Lab. Unv. of Calforna at Berkeley Berkeley

More information

Intelligent Traffic Conditioners for Assured Forwarding Based Differentiated Services Networks 1

Intelligent Traffic Conditioners for Assured Forwarding Based Differentiated Services Networks 1 Intellgent Traffc Condtoners for Assured Forwardng Based Dfferentated Servces Networks B. Nandy, N. Seddgh, P. Peda, J. Ethrdge Nortel Networks, Ottawa, Canada Emal:{bnandy, nseddgh, ppeda, jethrdg}@nortelnetworks.com

More information

A fair buffer allocation scheme

A fair buffer allocation scheme A far buffer allocaton scheme Juha Henanen and Kalev Klkk Telecom Fnland P.O. Box 228, SF-330 Tampere, Fnland E-mal: juha.henanen@tele.f Abstract An approprate servce for data traffc n ATM networks requres

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Performance Analysis of a Managed Bandwidth Service for ATM Networks

Performance Analysis of a Managed Bandwidth Service for ATM Networks Performance Analyss of a Managed Bandwdth Servce for ATM Networks Chrstos Bouras Chryss Chantz Vaggels Kapoulas Alexandros Panagopoulos Ioanna Sampraku Afrodte Sevast Research Academc Computer Technology

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling , pp.40-45 http://dx.do.org/10.14257/astl.2017.143.08 Applcaton of Improved Fsh Swarm Algorthm n Cloud Computng Resource Schedulng Yu Lu, Fangtao Lu School of Informaton Engneerng, Chongqng Vocatonal Insttute

More information

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

On the Exact Analysis of Bluetooth Scheduling Algorithms

On the Exact Analysis of Bluetooth Scheduling Algorithms On the Exact Analyss of Bluetooth Schedulng Algorth Gl Zussman Dept. of Electrcal Engneerng Technon IIT Hafa 3000, Israel glz@tx.technon.ac.l Ur Yechal Dept. of Statstcs and Operatons Research School of

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Optimizing Document Scoring for Query Retrieval

Optimizing Document Scoring for Query Retrieval Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng

More information

Derivation of Three Queue Nodes Discrete-Time Analytical Model Based on DRED Algorithm

Derivation of Three Queue Nodes Discrete-Time Analytical Model Based on DRED Algorithm Seventh Internatonal Conference on Informaton Technology Dervaton of Three Queue Nodes Dscrete-Tme Analytcal Model Based on DRED Algorthm Jafar Ababneh, Hussen Abdel-Jaber, 3 Fad Thabtah, 3 Wael Had, EmranBadarneh

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Annales UMCS Informatica AI 1 (2003) UMCS. Designing of multichannel optical communication systems topologies criteria optimization

Annales UMCS Informatica AI 1 (2003) UMCS. Designing of multichannel optical communication systems topologies criteria optimization Annales Informatca AI 1 (2003) 277-284 Annales Informatca Lubln-Polona Secto AI http://www.annales.umcs.lubln.pl/ Desgnng of multchannel optcal communcaton systems topologes crtera optmzaton Mrosław Hajder,

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Support Strong Consistency for Mobile Dynamic Contents Delivery Network

Support Strong Consistency for Mobile Dynamic Contents Delivery Network Nnth IEEE Internatonal Symposum on Multmeda 27 Support Strong Consstency for Moble Dynamc Contents Delvery Networ Zhou Su, Jro Katto and Yasuho Yasuda Graduate School of Scence and Engneerng, Waseda Unversty,

More information

Solutions for Real-Time Communication over Best-Effort Networks

Solutions for Real-Time Communication over Best-Effort Networks Solutons for Real-Tme Communcaton over Best-Effort Networks Anca Hangan, Ramona Marfevc, Gheorghe Sebestyen Techncal Unversty of Cluj-Napoca, Computer Scence Department {Anca.Hangan, Ramona.Marfevc, Gheorghe.Sebestyen}@cs.utcluj.ro

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

A fault tree analysis strategy using binary decision diagrams

A fault tree analysis strategy using binary decision diagrams Loughborough Unversty Insttutonal Repostory A fault tree analyss strategy usng bnary decson dagrams Ths tem was submtted to Loughborough Unversty's Insttutonal Repostory by the/an author. Addtonal Informaton:

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT 3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ

More information

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks 12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele

More information

An Efficient Genetic Algorithm with Fuzzy c-means Clustering for Traveling Salesman Problem

An Efficient Genetic Algorithm with Fuzzy c-means Clustering for Traveling Salesman Problem An Effcent Genetc Algorthm wth Fuzzy c-means Clusterng for Travelng Salesman Problem Jong-Won Yoon and Sung-Bae Cho Dept. of Computer Scence Yonse Unversty Seoul, Korea jwyoon@sclab.yonse.ac.r, sbcho@cs.yonse.ac.r

More information

Obstacle-Aware Routing Problem in. a Rectangular Mesh Network

Obstacle-Aware Routing Problem in. a Rectangular Mesh Network Appled Mathematcal Scences, Vol. 9, 015, no. 14, 653-663 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.1988/ams.015.411911 Obstacle-Aware Routng Problem n a Rectangular Mesh Network Norazah Adzhar Department

More information

USER CLASS BASED QoS DIFFERENTIATION IN e WLAN

USER CLASS BASED QoS DIFFERENTIATION IN e WLAN USER CLASS BASED QoS DIFFERENTIATION IN 802.11e WLAN Amt Kejrwal, Ratan Guha School of Computer Scence Unversty of Central Florda Orlando, FL-32816 USA E-mal: {kejrwal, guha}@cs.ucf.edu Manak Chatterjee

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Network-Driven Layered Multicast with IPv6

Network-Driven Layered Multicast with IPv6 Network-Drven Layered Multcast wth IPv6 Ho-pong Sze and Soung C. Lew Department of Informaton Engneerng, The Chnese Unversty of Hong Kong, Shatn, N.T., Hong Kong {hpsze8, soung}@e.cuhk.edu.hk Abstract.

More information

Scheduling and queue management. DigiComm II

Scheduling and queue management. DigiComm II Schedulng and queue management Tradtonal queung behavour n routers Data transfer: datagrams: ndvdual packets no recognton of flows connectonless: no sgnallng Forwardng: based on per-datagram forwardng

More information

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks

GA-Based Learning Algorithms to Identify Fuzzy Rules for Fuzzy Neural Networks Seventh Internatonal Conference on Intellgent Systems Desgn and Applcatons GA-Based Learnng Algorthms to Identfy Fuzzy Rules for Fuzzy Neural Networks K Almejall, K Dahal, Member IEEE, and A Hossan, Member

More information

Adaptive Connection Admission Control for Mission Critical Real-Time Communication Networks Abstract 1 Introduction

Adaptive Connection Admission Control for Mission Critical Real-Time Communication Networks Abstract 1 Introduction Adaptve Connecton Admsson Control for Msson Crtcal Real-Tme Communcaton etwors B. Devalla, A. Sahoo, Y. Guan, C. L, R. Bettat and W. Zhao Department of Computer Scence, Texas A&M Unversty, College Staton,

More information

An Ant-based approach to Power-Efficient Algorithm for Wireless Sensor Networks

An Ant-based approach to Power-Efficient Algorithm for Wireless Sensor Networks An Ant-based approach to Power-Effcent Algorthm for Wreless Sensor Networs Yaofeng Wen, Yuquan Chen, and Dahong Qan, Senor Member, IEEE Abstract We present an adaptve approach for mprovng the performance

More information

Conditional Speculative Decimal Addition*

Conditional Speculative Decimal Addition* Condtonal Speculatve Decmal Addton Alvaro Vazquez and Elsardo Antelo Dep. of Electronc and Computer Engneerng Unv. of Santago de Compostela, Span Ths work was supported n part by Xunta de Galca under grant

More information

A Robust Method for Estimating the Fundamental Matrix

A Robust Method for Estimating the Fundamental Matrix Proc. VIIth Dgtal Image Computng: Technques and Applcatons, Sun C., Talbot H., Ourseln S. and Adraansen T. (Eds.), 0- Dec. 003, Sydney A Robust Method for Estmatng the Fundamental Matrx C.L. Feng and Y.S.

More information