Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Size: px
Start display at page:

Download "Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router"

Transcription

1 Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of Inforation Technology & Systes The Arab Acadey for Banking & Financial Sciences P.O. Box 13190, Aan 11942, Jordan hbahadili@aabfs.org, afar_ababneh@yahoo.co 2 Manageent Inforation Systes Faculty of Inforation Technology Philadelphia University P.O. Box 11301, Aan 11123, Jordan ffayez@philadelphia.edu.o ABSTRACT. This paper presents a derivation of an analytical odel to evaluate the perforance of a ulti-queue nodes network router, which is referred to as the QN odel. In this odel, expressions were derived to calculate two perforance etrics, naely, the queue node and syste utilization factors. In order to deonstrate the flexibility and effectiveness of the QN odel in analyzing the perforance of a ulti-queue nodes network router, two scenarios were perfored. These scenarios investigated the variation of queue node and syste utilization factors against queue node dropping probability for various nubers of queue nodes, and packets arrival routing probabilities. The perfored scenarios deonstrated the flexibility and effectiveness of the QN odel to evaluate the perforance of a ulti-queue nodes router prior to the design and ipleentation stage as copared to experiental tests and coputer siulations. KEYWORDS: Congested networks; network routers; active queue anageent; ulti-queue syste; analytical odeling; utilization factor. 1. INTRODUCTION Due to the enorous developent and wide spread of coputer networks and the Internet, congestion becoes a critical issue, which needs to be efficiently solved to achieve optiu network perforance [1, 2, 3, 4]. Congestion usually occurs at the network router buffer when the nuber of incoing packets exceeds the available network resources, such as buffer space and processing speed of the network router. Multi-queue systes are widely used as a practical solution to the network congestion proble. Therefore, it is very iportant to have efficient, reliable, and accurate odels to analyze the perforance of the network and consequently to contrivance optiu designs for the congestion avoidance queuing syste at the network router [5, 6, 7, 8]. Practical experients and siulations are the ost widely-used ethodologies for analyzing the perforance of ulti-queue systes during congestion [2, 8]. However, several efforts have also been directed towards atheatical odeling of ulti-queue systes in congested networks. This is because atheatical odels are cheaper and easier to use than experiental or siulation applications, and also they can iprove understanding of the real proble to set-up appropriate and flexible solutions that suit the network and design requireents [8, 9]. Analytical odels were developed in [1, 5, 6] to evaluate the perforance of a discrete-tie activequeue anageent (AQM) based queuing systes of one and two-queue nodes; where analytical expressions were derived to calculate a nuber of perforance etrics, such as: average queue length, throughput, average queuing delay, and packet-loss rate. Recently, we have carried-out a research proect to extend the odel to evaluate the perforance of a ulti-queue nodes router. 77

2 The research contributed to develop two analytical odels and introduced two ore perforance etrics; these are [10]: (1) The acroscopic analytical odel, which calculates queue nodes and syste perforance independent of the AQM algorith, and it is referred to as QN odel. In the QN odel, expressions were derived to calculate two perforance etrics, these are: queue node and syste utilization factors, U and U s. (2) The icroscopic analytical odel, which calculates the queue nodes perforance based on the discrete-tie dynaic rando early detection (DRED) algorith. Therefore, it is referred to as DTD-QN odel. In this odel, expressions were derived to calculate the four perforance etrics entioned above. The derived atheatical odels can be used to iprove understanding of the real proble of a ulti-queue nodes router to set-up appropriate and flexible paraeters that suit the network and design requireents, and eet all sources (users, services, and applications) needs. In this paper, we only present the description and derivation of the first odel, naely the QN odel. In order to deonstrate the flexibility and effectiveness of the derived expressions, they were used to investigate the effect of the nuber of queue nodes () within the router, and packets arrival routing probability (p 0 ), on U and U s for various values of dropping probabilities p d (), where =1, 2, 3,,. This section provides an introduction to the general doain of this paper. The rest of this paper is organized as follows: Section 2 presents a literature review on the ost recent and related researches that concern with developing analytical odels to evaluate the perforance of queuing systes. Section 3 describes the QN odel and the derivation of expressions for calculating the perforance etrics U and U s. In Section 4, the derived expressions are used to estiate the variation of U and U s against p d () for various values of and p 0. Finally, in Section 5, based on the obtained results conclusions are drawn and suggestions and recoendations for future work are pointed-out. 2. Literature Review This section presents a literature review on the ost recent and related researches that were conducted to develop analytical perforance evaluation odels for the existing queuing systes and algoriths. At this stage, it is very iportant to realize that there are only liited nubers of references precisely concern with developing such analytical odels, as ost researchers use coputer siulations or experiental tests in evaluating their systes or algoriths. H. Abdel-Jaber et. al [5] derived an analytical odel to evaluate the perforance of a discrete-tie DRED-based queuing syste, which consists of one and two-queue nodes. They derived analytical expressions to calculate four perforance etrics, these are: average queue length, throughput, average queuing delay, and packet-loss rate. L. Hoflack et. al [11] derived approxiate expressions to calculate the tail probabilities of the buffer occupancy (nuber of packets stored in the buffer) in a discrete-tie queuing odel with infinite storage capacity and one single output line. This odel applied to study the traffic of a file server, where one file download by a user corresponds to one session. The steady-state probability generating functions of the nuber of active sessions, buffer occupancy and packet delay were derived. The derived expressions can be used to study the influence of the different syste paraeters. F. Baccelli and D. McDonal [12] derived a closed for forula for the stationary throughput obtained by an HTTP flow, which consists of a succession of idle and download periods. The file downloads are subect to a fixed packet-loss probability. For this stochastic odel, they also derived closed for expressions for the ean tie to transfer a file and for the distribution of the throughput. Several laws of file sizes and idle ties were considered including heavy tailed distributions. They briefly discussed how the forulas can be applied to predict bandwidth sharing aong copeting HTTP flows. L. Guan et. al [1] presented a discrete-tie queuing odel for the perforance evaluation of congestion control based on Rando Early Detection (RED) using queue thresholds. The 78

3 analytical odel for a discrete-tie finite queue incorporates two thresholds H 1 and H 2 (H 2 >H 1 ). Before the nuber of packets in the syste reaches the first threshold H 1, the queue operates norally with arrival rate α 1. When the nuber of packets in the syste is between H 1 and H 2, packets are dropped probabilistically with the drop probability (p d ) increasing linearly with syste contents. Beyond H 2, p d then reains constant until the nuber of packets reaches the syste capacity. The syste can be potentially used as an analytical odel for congestion control based on RED. I. Awan et. al [13] presented a fraework for the perforance analysis of queuing networks with blocking under AQM schee. The analysis was based on a queue-by-queue decoposition technique. The use of queue thresholds is a well-known technique generalized exponential distribution which can capture the bursty property of network traffic. The analytical solution was obtained using the axiu entropy principle. The fors of the state and blocking probabilities were analytically established at equilibriu via appropriate ean value constraints. The initial nuerical results deonstrated the credibility of the proposed analytical solution. L. Wang et. al [14] developed an analytical perforance odel for a finite capacity queuing syste with AQM echaniss based on the instantaneous nuber of packets in the queue. They considered two different traffic classes odeled by Poisson arrival processes. Expressions for the aggregated and arginal perforance easures including the ean queuing length, response tie, syste throughput, probability of packet-losses and ean waiting tie were derived. The validity of the analytical results was deonstrated by coparing the analytical results and those obtained fro siulation experients. 3. The DTD-QN Analytical Model Queuing systes with ore queue nodes are required to eet the evolving network needs. Therefore, it is iportant to have efficient tools to evaluate the perforance of such systes and help syste designers to select appropriate design paraeters [5, 6, 15]. It is clear that availability of such tools play a crucial role in designing and building cost-effective queuing systes. This paper is concerned with the developent of such tool, in particular, developent of an analytical odel that can be used to evaluate the perforance of a ulti-queue nodes queuing syste. Thus, it is referred to as QN analytical odel. Before we proceed with the derivation of the QN odel, we believe it is iportant to describe the architecture of the queuing syste and how it works, and also to define the syste variables. But first, let us start with the definition of the syste variables. Syste variables are classified into design and network variables as follows: (1) Design-driven variables, which are the variables derived fro the technological design of the syste, such as: nuber of queue nodes, buffer size (axiu queue size), and various interaction probabilities. (2) Network-driven variables, which are the variables derived fro the network environent, such as packets arrival rate. 3.1 The Architecture of the Multi-Queue Nodes Syste The architecture of a ulti-queue nodes syste consisting of queue nodes (=1 to ) is shown in Figure 1. The architectural odel shows that the syste consists of ain arrival-point, where all packets are arrived there, and then distributed according to certain probabilities (p 0 ) to the different arrival-points of each queue node within the syste. Each queue node has one arrival-point and one departure-point. The packets leaving a queue node are either depart the syste, feedback to the sae queue node, or bypass to other queue nodes within the syste, each with a certain probability. In addition, each queue node has a certain packet dropping probability (p d ()). 79

4 P 11 p 01 = 1 =1 P 1 P 13 β 1 p 12 p10 P 21 p 22 =2 p 02 P 2 P 23 β2 p 20 λ arr =2 P 31 P 32 P 3 P 33 p 03 = 3 =3 β 3 p30 P 1 P 2 P P 3 p 0 = = β P 0 FIGURE 1: The architecture of a ulti-queue nodes syste. 3.2 Derivation of the QN Analytical Models Figure 1 assues that data packets arrive to the network router at an arrival rate of λ arr. Then these data packets are distributed between the queue nodes according to p 0, where p 0 is defined as the probability that a packet arriving at the network router is forwarded to queue node. The actual packet rate reaches the arrival point of queue node is denoted as λ 0 and can be atheatically calculated as: λ 0 = p 0 λ arr (1) The input to each queue node also includes packets that ay be bypassed fro other queue nodes in the queuing syste, including the queue node itself (i.e., feedback). These packets are bypassed according to pre-adusted probabilities (p i ), which can be defined as the probability that a packet is bypassed fro queue node i (i=1 to ) to queue node (=1 to ). Calculation of the queue node packets arrival rate (λ ) It can be seen fro Figure 1 that the total packet arrival rate for any queue node (λ ) within the syste can be calculated by establishing a packet balance at the arrival-point of queue node. Accordingly, λ can be calculated as: 0 arr i i 0 i i i= 1 i= 1 λ = p λ + p B = λ + p B (=1 to ) (2) Where p 0 is the probability that a packet arriving at the network router arrival-point is bypassed to queue node ; p i is the probability that a packet is bypassed fro queue node i to (it is called feedback probability when i=), λ arr is the packets arrival rate at the network router (network arrival rate); λ is the total packets arrival rate at queue node, B is the queue node departure rate, and nuber of queue nodes. The arrival rate of any queue node (λ ) can also be calculated as: 80

5 λ = B + λ d (3) Where λ d is the dropping rate, which can be calculated as: λ d = p d () λ (4) Substituting Eqn. (4) into Eqn. (3) yields: B λ = B + p d () λ = 1 p ( ) d (5) Substituting Eqn. (5) into Eqn. (2) yields the following general set of linear equations: 1 p B + p B = p i i 0 arr 1 p ( ) i 1 d = i λ (=1 to ) (6) Eqn. (6) can be siplified to: pˆ B + p B = p λ (=1 to ) (7) i = 1 i i 0 arr i Where pˆ = 1 p 1 p ( ) (8) d Eqn. (7) can be written in a atrix for as: pˆ 11 p21 p31 L p1 B1 p01λarr p ˆ 12 p22 p32 p 2 B 2 p02λ L arr p ˆ 13 p23 p33 L p 3 B 3 = p03λ arr M M M L M M M p ˆ 1 p2 p3 L p B p0λ arr (9) Eqn. (9) represent a set of linear equations with unknowns (B ) fro =1 to. The above set of linear equations can be easily solved using linear solvers, such as: Gaussian eliination [16]. After coputing the values of the queue node departure rate B the values of λ can be coputed using Eqn. (5). Calculation of the queuing syste packets departure rate (λ dep ) As we have discussed earlier in this section that packets leaving the queue at any of the queue node within the syste are routed in one of the following directions: (1) Depart fro the queuing syste with probability (p 0 ). (2) Feedback to the sae queue node with probability (p ). (3) Bypassed to be re-queued at other queue nodes within the syste with probability (p i ). In all cases i and varies fro 1 to. A packet balance equation can be established at the departure-point of each queue node as follows: 0 k = 1 k k B = p B + p B + p B = p B (10) k = 0 k 81

6 Where B is the departure rate fro queue node ; p 0 is the probability of sending packets outside the queuing syste, for exaple, toward the processing unit; p is the probability of bypassing a packet back to be re-queued at the sae queue node; p k is the probability of bypassing packets to other queue nodes within the syste. The departure rate of the queue node, i.e., the nuber of packets departed fro each node per unit tie, which is referred to as p 0 ay be calculated as: λ 0 = p 0 B (11) So that the total net departure rate (λ dep ) of the queuing syste, i.e., the total nuber of packets departed fro all queue nodes per unit tie, is given by: λ dep 0 0 = 1 = 1 = p B = λ (12) Calculation of the queuing syste and queue node utilization factors Following the derivations of an expression to calculate the queue node and syste and arrival and departure rates, it is possible now to calculate the utilization factor for each of the as follows: (1) Queue node utilization factor (U ). It is defined as the ratio between the queue node departure rate (B ) and the queue node arrival rate (λ ), which is atheatically expressed in percentage for as: U B = 100 (13) λ (2) Queuing syste utilization factor (U s ). It is defined as the ratio between the queuing syste departure rate (λ dep ) and the syste arrival rate (λ arr ), which is atheatically expressed in percentage for as: U s λdep = 100 (14) λ arr Substituting for λ arr fro Eqn. (2) and λ dep fro Eqn. (12) into Eqn. (14), U s can also be expressed as: B U p p p p U s = o o = o o = 1 λ = 1 (15) 4. RESULTS AND DISCUSSIONS The QN analytical odel is ipleented in a C++ code, and used to evaluate the perforance of a ulti-queue node syste. It can be recognized that there are infinite nuber of scenarios that can be perfored using different cobinations of network and design paraeters, and for each scenario the perforance of the queue node and/or the syste can be investigated. Investigating the perforance for all possible cobinations is ipractical and beyond the obectives of this paper. In this paper two scenarios are ipleented. These scenarios investigated the variation of U and U s against p d () for various values of and p Scenario #1. Investigate the Variation of U and U s against p d () for Various Values of In this scenario, the QN odel is used to investigate the variation of U and U s against p d () for various values of (=3, 4, and 5). The values of p d () vary between 0 to 0.25 in step of 0.05 and λ arr is unity. The queue nodes are assued to have equal arrival and departure routing probabilities, and, the feedback routing probability is always twice the bypass routing probabilities. 82

7 Table 1 lists the queue nodes packets arrival, feedback, bypass, and departure routing probabilities. TABLE 1: Packets routing probabilities for Scenario #1. p 0 i=1 i=2 i=3 p p 0 i=1 i=2 i=3 i=4 p p 0 i=1 i=2 i=3 i=4 i=5 p p i p i p i The results are shown in Figure 2. The ain outcoes of these investigations are that has no effect on U s, but U decreases as increases, and both U and U s are decreasing as p d () increases. This is because U and U s represent a ratio between the nuber of packets left the router to the total nuber arrived, and as p d () increases the total nuber of packets dropped increases, so that the total nuber of packets leaving the router decreases, and consequently U and U s are decreased. FIGURE 2: Variation of U and U s against p d() for Scenario # Scenario #2. Investigate the Variation of U and U s against p d () for Various Values of p 0 In scenario #2, the QN odel is used to investigate the variation of U and U s against p d () for values of p 0. The values of p d () vary between 0 to 0.25 in step of The queuing syste is assued to have three queue nodes (=3) and λ arr =1. Four cases are considered each with different arrival routing probabilities as given in Table 2. In addition, Table 2 tabulates other input paraeters, naely, feedback, bypass, and departure routing probabilities. The results for this scenario are shown in Figure 3. 83

8 TABLE 2: Packets routing probabilities for Scenario #1.Case p 01 p 02 p p i i=1 i=2 i=3 p \ FIGURE 3: Variation of U and U s against p d() for Scenario #2. The ain outcoes of this set can be suarized as follows: (1) For each set of p 0, U and U s are decreasing linearly as p d () increases for the sae reasons discussed in Scenario #1. (2) For a certain value of p d (), U s is the sae regardless of the values of p 0. For exaple, when p d ()=0.05, U s =93.8% for all cases 1 to 4, where each case presents different values of p 0. 84

9 (3) For a certain value of p d (), the U directly proportional to p 0. (4) The syste U s is the su of the queue nodes U as it was proved in Eqn. (15). (5) The syste presents an U s of 100%, when p d ()=0. 5. CONCLUSIONS Based on establishing a packet balance at the network router end-points, naely, the arrival and departure points, an analytical odel was derived to evaluate the perforance of a ulti-queue nodes syste designed to process packets arrived at the network router. The odel was referred to as the QN odel. The derived expressions can be used effectively to accurately evaluate and investigate the perforance of a ulti-queue nodes syste running under different network conditions and characterized by different design paraeters. The cost of ipleenting and running the analytical odel is inial as copared to perfor the sae evaluation and investigation using coputer siulations or experiental tests. The analytical odel proposed in this paper is expected to appreciably and significantly contribute to a nuber of future studies, such as: using the QN odels to perfor ore scenarios investigating the variation of the queue node and syste perforance for other cobinations of input paraeters. For exaple, investigate the effect of departure probabilities. It is highly recoended to dynaically change the routing probabilities as the nuber of connections and syste load changes. In this case network routers can effectively control their resources to aintain high link utilization. This echanis is attractive for the deployent of large IP networks supporting a wide range of connections and large aggregations of traffic. REFERENCES [1] L. Guan, I. U. Awan, M. E. Woodward, and X. Wang. Discrete-Tie Perforance Analysis of a Congestion Control Mechanis Based on RED under Multi-Class Bursty and Correlated Traffic. Journal of Systes and Software, Vol. 80, Issue 10, pp , [2] M. Welzl. Network Congestion Control: Managing Internet Traffic. John Wiley & Sons, [3] S. Floyd and V. Jacobson. Rando Early Detection Gateways for Congestion Avoidance. IEEE/ACM Transactions on Networking, Vol. 1, No. 4, pp , [4] M. E. Woodward. Counication and Coputer Networks: Modeling with Discrete-Tie Queues. Pentech Press, [5] H. Abdel-Jaber, F. Thabtah, M. E. Woodward, and Air Abu-Ali. Perforance Evaluation for DRED Discrete-Tie Queuing Network Analytical Model. Journal of Network and Coputer Applications, Vol. 31, Issue 4, pp , Noveber [6] H. Abdel-Jaber, M. E. Woodward, F. Thabtah, and M. Etbega. A Discrete-Tie Queue Analytical Model Based on Dynaic Rando Early Drop. Proceedings of the 4 th IEEE International Conference on Inforation Technology: New Generations (ITNG 2007), Las-Vegas, USA, pp , April [7] J. Aweya, M.Ouellette, and D. Y. Montuno. A Control Theoretic Approach to Active Queue Manageent. Journal of Coputer Networks, Vol. 36, Issue 2-3, pp , [8] T. G. Robertazzi. Coputer Networks and Systes: Queuing Theory and Perforance Evaluation. 3 rd Edition, Springer Verlag [9] H. Al-Bahadili. On the Use of Discrete-Event Siulation in Coputer Networks Analysis and Design. Handbook of Research on Discrete-Event Siulation Environents: Technologies and Applications (Editors: Evon M. O. Abu-Taieh and Asi A. El-Sheikh), Inforation Science Reference, ISBN: , Chapter 19, [10] J. Ababneh. Developent of a Discrete-Tie DRED-Based Multi-Queue Nodes Network Analytical Model. PhD Thesis, The Arab Acadey for Banking & Financial Sciences, Aan-Jordan, May [11] L. Hoflack, S. De Vuyst, S. Wittevrongel, and H. Bruneel. Syste Content and Packet Delay in Discrete- Tie Queues with Session-Based Arrivals. Proceeding of the 5 th International Conference on Inforation Technology: New Generations, pp , [12] F. Baccelli and D. R. McDonald. A Stochastic Model for the Throughput of Non-Persistent TCP Flows. Journal of Perforance Evaluation, Vol. 65, Issues 6-7, pp ,

10 [13] I. Awan, A. Yar, M. E. Woodward. Analysis of Queuing Networks with Blocking under Active Queue Manageent Schee. Proceedings of the 12 th International Conference on Parallel and Distributed Systes (ICPADS'06), Vol. 2, pp , [14] L. Wang, G. Min, I. Awan. Modeling Active Queue Manageent with Different Traffic Classes. Proceedings of the 20 th International Conference on Advanced Inforation Networking and Applications, Vol. 2, pp , [15] M. Joshi, A. Mansata, S. Talauliker, and C. Beard. Design and Analysis of Multi-Level Active Queue Manageent Mechaniss for Eergency. Journal of Coputer Counications, Vol. 28, Issue 2, pp , [16] W. H. Press, S. A. Teukolsky, W. T. Vetterling, and B. P. Flannery. The Art of Scientific Coputing. 3 rd Edition, Cabridge University,

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL

PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

A Hybrid Network Architecture for File Transfers

A Hybrid Network Architecture for File Transfers JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,

More information

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN

Adaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan

More information

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds

Evaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles

More information

The Internal Conflict of a Belief Function

The Internal Conflict of a Belief Function The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

MAC schemes - Fixed-assignment schemes

MAC schemes - Fixed-assignment schemes MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on

More information

Performance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions

Performance Analysis of Exposed Terminal Effect in IEEE Ad Hoc Networks in Finite Load Conditions Perforance Analysis of Exposed Terinal Effect in IEEE 80.11 Ad Hoc Networks in Finite Load Conditions Diitris Vassis 1, Georgios Korentzas 1 1 Dept. of Inforation and Counication Systes Engineering University

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction

Relocation of Gateway for Enhanced Timeliness in Wireless Sensor Networks Abstract 1. Introduction Relocation of ateway for Enhanced Tieliness in Wireless Sensor Networks Keal Akkaya and Mohaed Younis Departent of oputer Science and Electrical Engineering University of Maryland, altiore ounty altiore,

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Equation Based Congestion Control for Video Transmission over WCDMA Networks

Equation Based Congestion Control for Video Transmission over WCDMA Networks Equation Based Congestion Control for Video Transission over WCDMA Networks Antonios Alexiou, Diitrios Antonellis and Christos Bouras Research Acadeic Coputer Technology Institute, Greece and Coputer Engineering

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION

DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION www.arpnjournals.co DYNAMIC ESTIMATION OF BDP IN MANETS FOR EFFECTIVE NEXT NODE SELECTION N. Snehalatha 1 and Paul Rodrigues 2 1 School of Coputing, SRM University, Chennai, Tail Nadu, India 2 Departent

More information

Knowledge Discovery Applied to Agriculture Economy Planning

Knowledge Discovery Applied to Agriculture Economy Planning Knowledge Discovery Applied to Agriculture Econoy Planning Bing-ru Yang and Shao-un Huang Inforation Engineering School University of Science and Technology, Beiing, China, 100083 Eail: bingru.yang@b.col.co.cn

More information

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium 1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

Research Article A Novel Data Classification and Scheduling Scheme in the Virtualization of Wireless Sensor Networks

Research Article A Novel Data Classification and Scheduling Scheme in the Virtualization of Wireless Sensor Networks International Journal of Distributed Sensor Networks Volue 2013, Article ID 546708, 14 pages http://dx.doi.org/10.1155/2013/546708 Research Article A Novel Data Classification and Scheduling Schee in the

More information

Author. Published. Journal Title DOI. Copyright Statement. Downloaded from. Griffith Research Online. Kandjani, Hadi, Wen, Larry, Bernus, Peter

Author. Published. Journal Title DOI. Copyright Statement. Downloaded from. Griffith Research Online. Kandjani, Hadi, Wen, Larry, Bernus, Peter Enterprise Architecture Cybernetics for Global Mining Projects: Reducing the Structural Coplexity of Global Mining Supply Networks via Virtual Brokerage Author Kandjani, Hadi, Wen, Larry, Bernus, Peter

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization

More information

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction

A Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao

More information

QoS and Sensible Routing Decisions

QoS and Sensible Routing Decisions QoS and Sensible Routing Decisions Erol Gelenbe Dept. of Electrical & Electronic Engineering Iperial College London SW7 2BT e.gelenbe@iperial.ac.uk Abstract Network Quality of Service (QoS) criteria of

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

Multi Packet Reception and Network Coding

Multi Packet Reception and Network Coding The 2010 Military Counications Conference - Unclassified Progra - etworking Protocols and Perforance Track Multi Packet Reception and etwork Coding Aran Rezaee Research Laboratory of Electronics Massachusetts

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

Dynamical Topology Analysis of VANET Based on Complex Networks Theory

Dynamical Topology Analysis of VANET Based on Complex Networks Theory BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis

More information

Experiences with complex user profiles for approximate P2P community matching

Experiences with complex user profiles for approximate P2P community matching Experiences with coplex user profiles for approxiate PP counity atching Patrizio Dazzi ISTI-CNR Pisa, Italy p.dazzi@isti.cnr.it Matteo Mordacchini IIT-CNR Pisa, Italy.ordacchini@iit.cnr.it Fabio Baglini

More information

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish,

A Generic Architecture for Programmable Trac. Shaper for High Speed Networks. Krishnan K. Kailas y Ashok K. Agrawala z. fkrish, A Generic Architecture for Prograable Trac Shaper for High Speed Networks Krishnan K. Kailas y Ashok K. Agrawala z fkrish, agrawalag@cs.ud.edu y Departent of Electrical Engineering z Departent of Coputer

More information

ACNS: Adaptive Complementary Neighbor Selection in BitTorrent-like Applications

ACNS: Adaptive Complementary Neighbor Selection in BitTorrent-like Applications ACNS: Adaptive Copleentary Neighbor Selection in BitTorrent-like Applications Zhenbao Zhou 1, 2, Zhenyu Li 1, 2, Gaogang Xie 1 1 Institute of Coputing Technology, Chinese Acadey of Sciences, Beijing 100190,

More information

Reducing Crosspoint Buffers for Performance Guaranteed Asynchronous Crossbar Scheduling

Reducing Crosspoint Buffers for Performance Guaranteed Asynchronous Crossbar Scheduling educing Crosspoint Buffers for Perforance Guaranteed Asynchronous Crossbar Scheduling Masoueh Karii, Zhuo Sun, and Deng Pan Florida International University Eails: {kari001, zsun003, pand}@fiu.edu Abstract

More information

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks

An Ad Hoc Adaptive Hashing Technique for Non-Uniformly Distributed IP Address Lookup in Computer Networks An Ad Hoc Adaptive Hashing Technique for Non-Uniforly Distributed IP Address Lookup in Coputer Networks Christopher Martinez Departent of Electrical and Coputer Engineering The University of Texas at San

More information

Generating Mechanisms for Evolving Software Mirror Graph

Generating Mechanisms for Evolving Software Mirror Graph Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

A Periodic Dynamic Load Balancing Method

A Periodic Dynamic Load Balancing Method 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Periodic Dynaic Load Balancing Method Taotao Fan* State Key Laboratory of Inforation

More information

ELEN : Project Progress Report. Second Order Delay Computation for RC networks with Non-Tree Topology

ELEN : Project Progress Report. Second Order Delay Computation for RC networks with Non-Tree Topology ELEN 689-603: Project Progress eport Second Order Delay Coputation for C networks wi Non-Tree Topology ajeshwary Tayade 000 07 573 //003 PDF created wi pdffactory trial version www.pdffactory.co : Introduction

More information

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks

BP-MAC: A High Reliable Backoff Preamble MAC Protocol for Wireless Sensor Networks BP-MAC: A High Reliable Backoff Preable MAC Protocol for Wireless Sensor Networks Alexander Klein* Jirka Klaue Josef Schalk EADS Innovation Works, Gerany *Eail: klein@inforatik.uni-wuerzburg.de ABSTRACT:

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math

Smarter Balanced Assessment Consortium Claims, Targets, and Standard Alignment for Math Sarter Balanced Assessent Consortiu s, s, Stard Alignent for Math The Sarter Balanced Assessent Consortiu (SBAC) has created a hierarchy coprised of clais targets that together can be used to ake stateents

More information

A Network-based Seamless Handover Scheme for Multi-homed Devices

A Network-based Seamless Handover Scheme for Multi-homed Devices A Network-based Sealess Handover Schee for Multi-hoed Devices Md. Shohrab Hossain and Mohaed Atiquzzaan School of Coputer Science, University of Oklahoa, Noran, OK 7319 Eail: {shohrab, atiq}@ou.edu Abstract

More information

From Relative to Observable Proportional Differentiation in OBS Networks

From Relative to Observable Proportional Differentiation in OBS Networks Fro Relative to Observable Proportional Differentiation in OBS Networks Pablo Argibay-Losada Departaento de Enxeñería Teleática Capus Universitario s/n, E-363 Vigo, SPAIN pargibay@det.uvigo.es Andrés Suárez-González

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

Adaptive Holistic Scheduling for In-Network Sensor Query Processing

Adaptive Holistic Scheduling for In-Network Sensor Query Processing Adaptive Holistic Scheduling for In-Network Sensor Query Processing Hejun Wu and Qiong Luo Departent of Coputer Science and Engineering Hong Kong University of Science & Technology Clear Water Bay, Kowloon,

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

Impact of Network Delay Variations on Multicast Sessions with TCP-like Congestion Control

Impact of Network Delay Variations on Multicast Sessions with TCP-like Congestion Control Ipact of Network Delay Variations on Multicast Sessions with TCP-like Congestion Control Augustin Chaintreau y François Baccelli z Christophe Diot yy y Ecole Norale Supérieure 45 rue d Ul 75005 Paris FRANCE

More information

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University

More information

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

Research Article A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks

Research Article A Game Theory Based Congestion Control Protocol for Wireless Personal Area Networks Journal of Sensors Volue 216, Article ID 61683, 13 pages http://dx.doi.org/1.11/216/61683 Research Article A Gae Theory Based Congestion Control Protocol for Wireless Personal Area Networks Chuang Ma,

More information

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms

Scheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We

More information

Ravine Streams: Persistent Data Streams in Disruptive Sensor Networks

Ravine Streams: Persistent Data Streams in Disruptive Sensor Networks Ravine Streas: Persistent Data Streas in Disruptive Sensor Networks Mingsen Xu, Wen-Zhan Song Departent of Coputer Science, Georgia State University Atlanta, Georgia 333, USA Eail: {xu4@student.gsu.edu,

More information

Multipath Selection and Channel Assignment in Wireless Mesh Networks

Multipath Selection and Channel Assignment in Wireless Mesh Networks Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India

More information

I ve Seen Enough : Incrementally Improving Visualizations to Support Rapid Decision Making

I ve Seen Enough : Incrementally Improving Visualizations to Support Rapid Decision Making I ve Seen Enough : Increentally Iproving Visualizations to Support Rapid Decision Making Sajjadur Rahan Marya Aliakbarpour 2 Ha Kyung Kong Eric Blais 3 Karrie Karahalios,4 Aditya Paraeswaran Ronitt Rubinfield

More information

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues

Mapping Data in Peer-to-Peer Systems: Semantics and Algorithmic Issues Mapping Data in Peer-to-Peer Systes: Seantics and Algorithic Issues Anastasios Keentsietsidis Marcelo Arenas Renée J. Miller Departent of Coputer Science University of Toronto {tasos,arenas,iller}@cs.toronto.edu

More information

On the Computation and Application of Prototype Point Patterns

On the Computation and Application of Prototype Point Patterns On the Coputation and Application of Prototype Point Patterns Katherine E. Tranbarger Freier 1 and Frederic Paik Schoenberg 2 Abstract This work addresses coputational probles related to the ipleentation

More information

Improve Peer Cooperation using Social Networks

Improve Peer Cooperation using Social Networks Iprove Peer Cooperation using Social Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 Noveber 5, 2007 Corresponding

More information

Rule Extraction using Artificial Neural Networks

Rule Extraction using Artificial Neural Networks Rule Extraction using Artificial Neural Networks S. M. Karuzzaan 1 Ahed Ryadh Hasan 2 Abstract Artificial neural networks have been successfully applied to a variety of business application probles involving

More information

Feature Based Registration for Panoramic Image Generation

Feature Based Registration for Panoramic Image Generation IJCSI International Journal of Coputer Science Issues, Vol. 10, Issue 6, No, Noveber 013 www.ijcsi.org 13 Feature Based Registration for Panoraic Iage Generation Kawther Abbas Sallal 1, Abdul-Mone Saleh

More information

AN APPROACH ON BIMODAL BIOMETRIC SYSTEMS

AN APPROACH ON BIMODAL BIOMETRIC SYSTEMS AN APPROACH ON BIODAL BIOETRIC SYSTES Eugen LUPU, Siina EERICH Technical University of Cluj-Napoca, 26-28 Baritiu str. Cluj-Napoca phone: +40-264-40-266; fax: +40-264-592-055; e-ail: Eugen.Lupu @co.utcluj.ro

More information

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage 216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent

More information

Data Caching for Enhancing Anonymity

Data Caching for Enhancing Anonymity Data Caching for Enhancing Anonyity Rajiv Bagai and Bin Tang Departent of Electrical Engineering and Coputer Science Wichita State University Wichita, Kansas 67260 0083, USA Eail: {rajiv.bagai, bin.tang}@wichita.edu

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Real-Time Detection of Invisible Spreaders

Real-Time Detection of Invisible Spreaders Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract

More information

Development of an Integrated Cost Estimation and Cost Control System for Construction Projects

Development of an Integrated Cost Estimation and Cost Control System for Construction Projects ABSTRACT Developent of an Integrated Estiation and Control Syste for Construction s by Salan Azhar, Syed M. Ahed and Aaury A. Caballero Florida International University 0555 W. Flagler Street, Miai, Florida

More information

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networs F. Mousavi Madani Departent of coputer engineering Alzahra University Tehran, Iran, osavif@alzahra.ac.ir Received:

More information

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient

More information

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S COPUTER GEERATED HOLOGRAS Optical Sciences 67 W.J. Dallas (onday, August 3, 004, 1:38 P) PART III: CHAPTER OE DIFFUSERS FOR CGH S Part III: Chapter One Page 1 of 8 Introduction Hologras for display purposes

More information

REVENUE-AWARE RESOURCE ALLOCATION IN THE FUTURE MULTI-SERVICE IP NETWORKS

REVENUE-AWARE RESOURCE ALLOCATION IN THE FUTURE MULTI-SERVICE IP NETWORKS REVENUE-AWARE RESOURCE ALLOCATION IN THE FUTURE MULTI-SERVICE IP NETWORKS Jian Zhang, Tio Haalainen, Jyrki Joutsensalo Dept. of Matheatical Inforation Technology, University ofjyvaskyla, FIN-40014 Jyvaskyla,

More information

Summary. Reconstruction of data from non-uniformly spaced samples

Summary. Reconstruction of data from non-uniformly spaced samples Is there always extra bandwidth in non-unifor spatial sapling? Ralf Ferber* and Massiiliano Vassallo, WesternGeco London Technology Center; Jon-Fredrik Hopperstad and Ali Özbek, Schluberger Cabridge Research

More information

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems

A Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems A Low-cost Meory Architecture with XIP for Mobile Ebedded Systes Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Ki, Shinhan Ki and Busoo Ki Software Center, SAMSUNG Electronics, Co., Ltd. Seoul 135-893,

More information

Reconstruction of Time Series using Optimal Ordering of ICA Components

Reconstruction of Time Series using Optimal Ordering of ICA Components Reconstruction of Tie Series using Optial Ordering of ICA Coponents Ar Goneid and Abear Kael Departent of Coputer Science & Engineering, The Aerican University in Cairo, Cairo, Egypt e-ail: goneid@aucegypt.edu

More information

Feature Selection to Relate Words and Images

Feature Selection to Relate Words and Images The Open Inforation Systes Journal, 2009, 3, 9-13 9 Feature Selection to Relate Words and Iages Wei-Chao Lin 1 and Chih-Fong Tsai*,2 Open Access 1 Departent of Coputing, Engineering and Technology, University

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

TALLINN UNIVERSITY OF TECHNOLOGY, INSTITUTE OF PHYSICS 17. FRESNEL DIFFRACTION ON A ROUND APERTURE

TALLINN UNIVERSITY OF TECHNOLOGY, INSTITUTE OF PHYSICS 17. FRESNEL DIFFRACTION ON A ROUND APERTURE 7. FRESNEL DIFFRACTION ON A ROUND APERTURE. Objective Exaining diffraction pattern on a round aperture, deterining wavelength of light source.. Equipent needed Optical workbench, light source, color filters,

More information

IN many interactive multimedia streaming applications, such

IN many interactive multimedia streaming applications, such 840 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, MAY 06 A Geoetric Approach to Server Selection for Interactive Video Streaing Yaochen Hu, Student Meber, IEEE, DiNiu, Meber, IEEE, and Zongpeng Li, Senior

More information

Planet Scale Software Updates

Planet Scale Software Updates Planet Scale Software Updates Christos Gkantsidis 1, Thoas Karagiannis 2, Pablo Rodriguez 1, and Milan Vojnović 1 1 Microsoft Research 2 UC Riverside Cabridge, UK Riverside, CA, USA {chrisgk,pablo,ilanv}@icrosoft.co

More information

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH Kulapraote Prathuchai Geoinforatics Center, Asian Institute of Technology, 58 Moo9, Klong Luang, Pathuthani, Thailand.

More information

A Model Free Automatic Tuning Method for a Restricted Structured Controller. by using Simultaneous Perturbation Stochastic Approximation

A Model Free Automatic Tuning Method for a Restricted Structured Controller. by using Simultaneous Perturbation Stochastic Approximation 28 Aerican Control Conference Westin Seattle Hotel, Seattle, Washington, USA June -3, 28 WeC9.5 A Model Free Autoatic Tuning Method for a Restricted Structured Controller by Using Siultaneous Perturbation

More information

A simplified approach to merging partial plane images

A simplified approach to merging partial plane images A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D

More information

Intelligent Robotic System with Fuzzy Learning Controller and 3D Stereo Vision

Intelligent Robotic System with Fuzzy Learning Controller and 3D Stereo Vision Recent Researches in Syste Science Intelligent Robotic Syste with Fuzzy Learning Controller and D Stereo Vision SHIUH-JER HUANG Departent of echanical Engineering National aiwan University of Science and

More information

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS Evaluation of the Tiing Properties of Two Control Networs: CAN and PROFIBUS Max Mauro Dias Santos 1, Marcelo Ricardo Steer 2 and Francisco Vasques 3 1 UnilesteMG, CEP 35170-056, Coronel Fabriciano MG Brasil.

More information

Distributed Multi-robot Work Load Partition In Manufacturing Automation

Distributed Multi-robot Work Load Partition In Manufacturing Automation th IEEE Conference on Autoation Science and Engineering Key Bridge Marriott, Washington DC, USA August 3-, Distributed Multi-robot Work Load Partition In Manufacturing Autoation Gira S Tewolde, Changhua

More information