TTEM: An Effective Trust-Based Topology Evolution Mechanism for P2P Networks

Size: px
Start display at page:

Download "TTEM: An Effective Trust-Based Topology Evolution Mechanism for P2P Networks"

Transcription

1 JOURNAL OF COMMUNICAIONS, VOL. 3, NO. 7, DECEMBER EM: An Effectve rust-based opology Evoluton Mechansm for P2P Networks Janl Hu Insttute of Networks & Informaton Securty, School of Computer, Natonal Unversty of Defense echnology, Changsha, Chna Emal: lxman82@gmal.com Quanyuan Wu, Bn Zhou Insttute of Networks & Informaton Securty, School of Computer, Natonal Unversty of Defense echnology, Changsha, Chna Emal: {quanyuan, bnzhou@nudt.edu.cn Abstract Current unstructured peer-to-peer (P2P systems lack far topology structures, and take no consderaton for malcous behavors of peers. he man reason s that the topology s not senstve to peer s trust, and cannot accommodate heterogenety of peers over the network. hus, a feedback credblty based global trust model s presented n ths paper. hen, based on the trust model, an adaptve topology evoluton mechansm for unstructured P2P networks s proposed. hrough ths mechansm, trusted peers can mgrate to the centrc poston, whle untrusted peers to the edge of the topology, guaranteeng farness durng topology evoluton. On the other hand, the mechansm can effectvely counter the malcous behavors of peers, and also has the ncentve functonalty, whch ncents peers to provde more hgh-qualty servces n order to get more return on servces. Analyss and smulatons show that, compared wth the current topologes, the resultng topology mechansm demonstrates more effectveness and robustness n combatng the selfsh or malcous behavors of peers. Index erms P2P, topology evoluton, trust, ncentve mechansm I. INRODUCION In recent years, pee-to-peer (P2P computng has acheved ts popularty n many dstrbuted applcatons, ncludng fle-sharng, dgtal content delvery, and P2P Grd computng []. However, current deployed systems lack any vable ncentve structures for encouragng users to behave n the best nterest of the communty. As a result, varous forms of abuse and attack have been observed n practce [2]. he most common ones are free rders [3] and the attacks from some types of malcous peers. For example, some peers n P2P networks only provde nauthentc servces (for example, bogus fles, or use collusve strategy to attack the trust system tself. A free rder s a user who only reduces servces from a P2P. Correspondng author, Janl Hu (Emal: lxman82@gmal.com network whle never sharng any fles. hese users become leeches and dran resources from the communty. hereby, how to mprove the avalablty of the system, compel ratonal and selfsh partcpants to share ther resources actvely, and punsh malcous peers, becomes a challengng task for the healthy development of P2P networks. As for the tradtonal resoluton, some researchers have proposed some trust system for combatng these problems [4-7]. In such a system, each user s assgned a trust value by the communty that reflects ts contrbuton to and ts partcpaton n the communty. In contrast to buldng a trust system wth reputatons or economcs that requres users to cooperate or some central authortes, we offer a trust based topology evoluton mechansm to warrant the avalablty, effectveness and farness of P2P networks. he avalablty of P2P networks has a close relaton wth P2P topology evoluton, whch s tghtly related to the heterogenety of peers. he heterogenety of the peer n P2P network nvolves such features as the mum connecton number, computaton capacty and honesty, etc. Hence, the peer s heterogenety s largely attrbuted to the trust heterogenety of ths peer. Untl now, n desgnng the topology evoluton mechansm, the popular dstrbuted P2P networks [8-0] don t take nto account the factor of heterogenety, and use the same metrc for the mportance of all peers, whch cannot ensure the farness of topology, and cannot prompt peers to share more authentc resources actvely. hus, referrng to the concept of trust n the socal network, we propose a trust-based P2P topology evoluton mechansm (EM, whch can make the normal peers take up good poston, and obtan authentc servces more effectvely, whle the selfsh or malcous peers are ostraczed to the frnge of the network, more dffcult to gan hgh-qualty servces. Analyss and smulaton experments show that EM has advantages n the effectveness of encouragng the normal peers and punshng the selfsh or malcous peers

2 4 JOURNAL OF COMMUNICAIONS, VOL. 3, NO. 7, DECEMBER 2008 over the exstng topology mechansm. he remanng parts of the paper are organzed as follows: Secton II revews the related work. Secton III descrbes the global trust computng model. Secton IV demonstrates EM concretely. Secton V smulates and dscusses EM. Fnally, we conclude the paper make suggestons for further research work. II. LIERAURE REVIEW he related work about the adaptve P2P topology manly ncludes several aspects as follow: ( Peer capacty-based topology evoluton. Cooper BF [] presents a topology evoluton mechansm, n whch peers can be self-organzed nto relatvely effcent networks to cope wth the over-loaded problems. In terms of ths mechansm, the connecton between peers can be dvded nto two categores, ncludng the search connecton (sendng search messages and the ndex connecton (sendng ndex messages. When subectng to the overloaded problem, the peer drops some connectons, accordng to the quantty of messages submtted by the neghborng peers. Smlar mechansms are also put forward by Lv Q, et al. [2] and Chawathe Y, et al. [3]. hese mechansms only conceve the factor of search connectons among peers. Each peer evaluates the request-processng capacty of neghborng peers, and computes the satsfactory degree for the neghborng peers n terms of the peer s own request-processng capacty and neghborng peers capacty. Fnally, ths peer establshes connecton wth peers wth hgh processng capacty to mprove the correspondng satsfactory degree, untl the current set of neghborng peers have met the demands for request-processng capacty. (2 Peer physcal locaton-based topology evoluton. Lu Y, et al. [4,5] gve an adaptve unstructured topology evoluton mechansm, whch solves the marchng problem between the P2P topology and the underlyng physcal network by choosng the nearer peer n real dstance as some peer s neghbor, to mprove the performance of P2P networks. (3 Peer trust-based adaptve topology evoluton. Conde [6] provdes an adaptve P2P topology (AP. he basc dea n AP s that after each transacton, the peer (supposed calculates the trust value of the correspondng peer (supposed, and compares the result wth ts neghborng peers, to determne whether there exsts some peer whose trust value s lower than that of peer. If yes, peer wll send the connecton request to peer. When peer receves the request, t wll use the same prncple to decde whether to receve ths request. Notably, the topology evoluton mechansms provded n ( and (2 take no consderaton for free-rdng or malcous behavors of peers, whle AP n (3 can suppress the free-rdng or malcous behavors to a certan degree. he dfferences between EM and AP are descrbed as follow: ( As for the trust value computaton, the local trust model provde by AP s a lttle rougher, but the feedback credblty based global trust model proposed n ths paper can dentfy and restran more effectvely the attacks from broad malcous peers. (2 When dealng wth the process of topology evoluton, AP only pays attenton to the process of the trust value comparson between the current transacton peer and neghbors to decde whch lnk to be dropped or dsplaced. However, n EM, the peer (supposed not only takes nto account the current peer, but also consders the peers, whch have ever transacted wth peer. In other words, peer can pck up the peer whch has the largest trust value from the whole transacton hstory, to make a contrast wth ts neghbors. III. PEER RUS MODEL A. Defnton of the Model Frstly, the defntons of the satsfactory degree valuaton functon and the local trust value are gven. Secondly we defne feedback credblty (FC, and then the global trust value (GV. Defnton Satsfactory degree valuaton functon. After transactng wth each other, one peer (the servce consumer wll submt ts ratngs of satsfactory degree to the other peer (the servce provder, whch can be defned as the followng map functon f (, :, fully satsfactory f (, = 0, fully unsatsfactory e( (0,, else n whch, we use the method of probablty to dstngush the dfferent QoS provded by dfferent peers. he number denotes peer feels fully satsfactory to the servce provded by peer, whle zero means for the opposte ratng, and the larger the value s, the more satsfactory the peer feels. Defnton 2 Local trust value (namely, the normalzed local satsfactory degree feedback. In the tme fracton t (t s decded by the concrete applcaton. For example, sx months, supposng m denotes the number for wth peer has nteracted wth peer. hus, the local trust value peer puts to peer can be defned: = D m f(, k =, m m 0 0, m = 0 where, m = 0, means there are no transacton records between peer and peer. hereby, we set 0 to the correspondng local trust value. Defnton 3 FC s used to measure the degree of accuracy of the feedback nformaton the feedback peers (servce consumers provde to the trustee (servce provder. Durng the trust evaluaton, the feedbacks provded by the peer wth hgher FC are trustworther, and are weghted more than those from the peer wth the lower FC, and vce versa. Normally, FC s relevant to the followng factors: ( he transacton frequency between peers. Normally, the hgher the frequency, the hgher FC s. (2 he consstency of ratng behavors between peers. he more the smlarty of ratngs between peer and the reference peer s, the more consstently they rate other peers n the network. We ntroduce the transacton densty factor ( (2 Num to

3 JOURNAL OF COMMUNICAIONS, VOL. 3, NO. 7, DECEMBER descrbe the transacton frequency between peer and peer, whch can be defned n (3. m m Num = β (0, m 0 n β (3 where, m denotes the transacton number between peer and peer, and n denotes the total transacton number of peer wth other peers. When the value of m equals 0, we set 0 to Num ; β, beng transacton densty regulatory constant, s used to portray precsely the actual state of the transacton frequency, and reflect exactly the dfference of the transacton densty of peers. We take the ndex for depctng the smlarty of ratngs between peers as Sm, used for representng the consstency of peers actons. Assumng the set of common nteracton peers between peer and peer as CSet(,. herefore, the dfference of ratngs between them can be defned as follows: Df Df D k CSet(, k D k = (4 CSet(, Supposng θ denotes the mum devaton peer can allow for peer, so we can defne Sm as: ( Sm Df Sm +, Df <θ 2 θ Sm = Sm θ Sm, else 2 Df Syntheszng the above two factors, we can gve the computaton formula of FC (denoted Cr as follows: (5 Cr = Num Sm (6 hus, based on the above analyss, we can conclude that the bgger the transacton number of feedback peers s, and the more consstent the ratng actons are, and so s FC. Defnton 4 We can defne the feedback qualty matrx as R = (R, n whch, R = D *Cr. Dfferent from the normal matrx of the network trust relatonshp D, the feedback qualty matrx not only allow for the peers local trust ratngs, but also consder the FC of these peers themselves. he approach of the convergence of these two knds of nformaton better pants the real trust level of the feedback nformaton. Defnton 5 In the network N, the GV of an arbtrary peer (denoted s defned n (7. (7 = D Cr K where, K denotes the peer set whch conssts of peers, who have ever nteracted wth peer, and offered feedbacks to t. We use the FC peer puts to peer and the GV of peer to weght the local trust nformaton provded by peer. Assumng the GV vector s = [, 2,, n ], then the matrx form of (7 s as follows: = R (8 n whch, R s the feedback qualty matrx gven n Defnton 4. B. he Convergence Analyss of GV Iteratve Computaton he teratve convergence feature of (8 determnes whether we can get the computaton results of the GV vector. In the followng, we use the proposton that the norm of the teratve matrx R s less than, to proof the convergence of (8. heorem For an arbtrary ntal vector, we can (0 ( k+ ( k conclude that the smple teratve formula = R of (8 converges. Proof he suffcent condton of the convergence for the above formula s the norm of the matrx R meets the lmtatons: R < [7]. For the computaton relatonshp: we can obtan from (6: R = D Cr Cr D Cr,, Cr = Num Sm < Num Sm < Sm <,,,,, herefore, the proposton of R < has been proofed. IV. RUS BASED OPOLOGY EVOLUION MECHANISM he peer s trust value represents the possblty of collaboratng wth each other n the future. herefore, ntutvely, evolvng the P2P topology, n terms of the peer s trust value, can keep the connectons for the collaboratve peers, exclude the non-collaboratve peers to the frnge of the network, and reach the obectve of ncentve functonalty to encourage the collaboratve peers and to punsh the non-collaboratve peers. As llustrated n Fg., the green, red and yellow small crcle denote the hghly trusted peer (C and D, the lowly trusted peer (A and B, and the normal peer. from the ntal stage (see (a, where peer A and peer B are lyng n the center of the topology, whle peer C and peer D are lyng n the frnge of the topology. hrough the topology evoluton, we can get a possble equlbrum topology (see (b that the hghly trusted peers move to the center, and the lowly trusted peers to the frnge. rust based topology evoluton s mplemented by the request-response mechansm between peers. A peer can locate the needed servce n P2P networks by sendng query requests. However, the real locatng effect for ths peer s largely determned by ts message forwardng mechansm. herefore, n ths secton, we offer a trust orented message forwardng mechansm (MFM to D A B C hghly trusted peer lowly trusted peer normal peer topology evoluton (a Random topology (b Equlbrum topology Fgure. A possble topology evoluton dagram ncent peers to enhance ts trust level, and reach a better D A B C

4 6 JOURNAL OF COMMUNICAIONS, VOL. 3, NO. 7, DECEMBER 2008 search effect. Before ntroducng the topology evoluton mechansm, we frst defne some notatons used later on. N(: he set composed of peer s neghborng peers; M(: he set composed of peers peer has ever transacted wth; CN mn (: he least trust threshold peer can allow to ts neghbors. In other words, f the trust value of a neghborng peer s less than CN mn (, peer wll dsconnect wth t; CR mn (: he least trust threshold other peers have to possess, when ther connecton requests are accepted by peer ; f the trust value of the requestng peer s less than CR mn (, peer wll refuse t; Fv( = { CRmn(, M( N (: he set of peers peer wshes to, but has not bult connectons wth; SNS( = { CNmn (, N( : he set of peers whose trust value s no less than CN mn (; Fv( = { Fv (, k Fv ( and k > k : he peer whose trust value s the mum n Fv(; N ( mn = { N (, k N ( and k k > : he peer whose trust value s the mnmum n N(; τ : he mnmum connecton number peer can mantan; mn τ : he mum connecton number peer can mantan. A. Message Forwardng Mechansm Query messages are propagated va floodng-based broadcast. A search query can be ntated by any node n the network by frst broadcastng to all peers n ts neghbor set. Each node, upon recevng a propagated search query, wll examne ts local servce system for a match. Any matches are returned drectly to the query ntator. he peer may then propagate the query to all ts neghbors except for the node from whch t receved the query. Each query mantans a tme-to-lve (L feld to lmt the scope of the query floodng. At query tme, the ssung peer wll set the L feld to some default value, whch s then decremented by one at each propagaton. A node recevng a query wth L=0 wll not forward the query. Fg. 2 llustrates how a query propagates through the P2P network. In the example, peer k ntates the search query, wth L=, by broadcastng to all of ts neghbors, n ths case peer. Peer decdes not to respond to the query and forwards the query to ts neghbors, except to peer k. Upon recevng the query, peer drectly responds to peer k wth a match. he query floodng termnates at peer snce the L s now 0. peer k peer query query response connecton peer Fgure 2. Query propagaton model o ncent the peer to provde more authentc servces actvely, and ncrease ts trust level, we relate the propagaton scope of the peer wth ts trust value. he peers wth dfferent trust values have dfferent propagaton effect. In other words, the peer wth hgher trust value wll be gven a larger search scope, and can go across many hops to reach more peers. hus, these peers can have more optons of servces offered by dfferent provders, and vce versa. As for the lowly trusted peers, n order to gan more hgh-qualty servces, they have to mprove the qualty of servces and feedbacks they provde to others, to ncrease ther own trust values. Concretely, the desgn dea of MFM s as follows: ( he probablty that a peer forwards the query request of the hghly trusted peer s always hgher than that does for the lowly trusted peer. (2 he query request messages sent by a peer are largely forwarded by the peer whose trust value s less than tself. In whch, the desgn prncple of ( can assure that the hghly trusted peer can get a larger search scope, and (2 can not only provde enough chance for the lowly trusted peer to provde good servces, but also restrct the opportunty for the lowly trusted peers to gan the servces from the hghly trusted peer. hs mechansm can prompt the lowly trusted peer to offer more contrbutons to others to mprove ts trust rank. In the lght of the above desgn prncple, takng advantage of the desgn method of the trust-crtcal broadcast search mechansm (BS [2], we gve a novel forwardng probablty algorthm as followed: r, Pf = r, > n whch, r denotes the current broadcast radus, and, denote the trust value of peer and peer, respectvely. We can get the fact from (9, that for an arbtrary r, the r r formula < s always correct. In other words, as to a peer, the probablty for t to obtan servces from the hghly trusted peer s always more than that does from the lowly trusted peer. he concluson has proved our above desgn dea n MFM. B. Sendng Connecton Request Peer can update the topology lnks every some tme, and when the tme s up, t wll process as the followng steps: Frstly, when peer meets the condton of Fv( N( τ <, t wll send connecton request to ( (9 Fv, whch shows the fact that peer wshes to establsh a desrable connecton wth Fv(, but the fnal result s determned by the negotaton process wth peer Fv(. As to peer Fv(, t wll decde whether to accept ths request or not. When the negotaton s successful, the state of.negotaton( Fv( returns the boolean value true, showng both partcpants hope to establsh the connecton. After buldng the connecton, peer wll remove peer Fv( from Fv(. Secondly, when Fv( N( = τ, the process s same

5 JOURNAL OF COMMUNICAIONS, VOL. 3, NO. 7, DECEMBER wth the above way, and the unque dfference s that peer wll drop the connecton wth peer N( mn, when ts current connecton number has reached the specfed threshold. Fnally, when Fv( = SNS( < τ mn, peer wll submt request to a random peer over the network. If the request s accepted, and the condton N ( > τ s satsfed, peer wll drop the connecton wth peer N( mn. Peer wll try to keep the connectons wth the τ mn neghbors, whose trust values are no less than N( mn. However, when peer has tred for many tmes wthout any response, t wll gve up. As the connecton demander, the topology evoluton algorthm for peer s descrbed as follow: Procedure connect_demander( { f ( Fv( N( < τ f (.negotaton(fv( =true { addconnceton(fv( ; remove Fv( from Fv(; f ( Fv( N( = τ f (.negotaton(fv( =true { addconnceton(fv( ; remove(n( mn ; remove Fv( from Fv(; f ( Fv( = SNS( < τ mn { negotate wth a random peer, and establsh connecton wth t; f ( N ( > τ remove(n( mn ; C. Recevng Connecton Request As the connecton recever peer, when t meets the condton of > CRmn ( N( < τ or > CRmn ( N( = τ, t wll negotate wth peer to determne whether to accept peer s request or not. he followng process s smlar to that n Secton B, and the correspondng algorthm s gven as follow: Procedure connect_recever( { f ( > CRmn ( N( < τ f (.negotaton(=true addconnceton(; f ( > CRmn ( N( = τ f (.negotaton(=true { addconnceton(; remove(n( mn ; In order to fulfll the above operatons, peer need mantan two tables as follow: one s the neghborng peer lst (see 3(a and the other s the transacton record lst (see 3(b, as shown n Fg. 3. In Fg. 3, ID,, IDk and ID ',, ' ID m are the dentfer sequences of peer s neghborng peers and peers who have ever transacted wth peer, respectvely;,, k and ' ',, m the correspondng trust value sequences of these peers, respectvely. Assumng the average mum connecton number of peer s k. We can know from the above topology evoluton algorthm, that, under the extreme crcumstances, the communcaton overhead mantaned by ths algorthm s Ok (. Due to the lmted connecton quantty wth peer, the real communcaton overhead s not very hgh. In terms of the data structure of peer, we can easly know ts storage overhead s Ok ( ( p+ q + Om ( ( p+ q Ok ( + Om (, n whch, p denotes the byte number used for storng the peer s dentfer, q does for the peer s trust value, and m represents the number of transacton record entry, stored n peer. In addton, we can get some storage space by deletng the outdated nformaton and the transacton records of peers wth low trust value perodcally. V. EXPERIMENS AND ANALYSIS A. Smulaton Setup he peers we smulate are categorzed nto three types, ncludng ( the normal peer, marked wth captal N, whch always provde authentc servces and honest recommendatons to others, (2 the free-rdng peer, marked wth captal F, whch doesn t offer any servce and recommendaton to others, and (3 the malcous peer, marked wth captal V, whch always gves low-qualty or fraudulent servces and dshonest recommendatons to others. In the smulaton experments, the proporton of these three types of peers s 3:5:2, respectvely. he related smulaton parameter settngs are gven n able I. he hardware platform of smulaton conssts of CPU for AMD Athlon 64 X2 Dual.9GHZ, and the memory of GMB, and the smulaton software s developed n Java. ID ID ID 2 2 ID 2 2 ID k k ID m m (a Fgure 3. ABLE I. (b he data structure of peer SIMULAION PARAMEERS SEINGS # of the total number of peers n N communty # of the mnmum neghborng connecton τ mn number τ CN mn CR mn β θ P res # of the mum neghborng connecton number #of the least trust threshold to dsconnect from ts neghborng peers #of the least trust threshold to be accepted for other peers connect requests % of the transacton densty regulatory constant # of the mum devaton between peers % of the probablty n response to query requests

6 8 JOURNAL OF COMMUNICAIONS, VOL. 3, NO. 7, DECEMBER 2008 B. Effectveness aganst Free-Rdng Peers hs experment s amed to verfy whether EM can effectvely bansh the F peers to the brm of the network or not. After beng banshed to the brm, F peers have a further topology dstance to N peers, and t s dffcult for them to obtan the servces provded by N peers. We have a comparson smulaton for EM and AP. Here, we apply the shortest path length (SPL as the metrc to measure the locaton change durng the process of P2P topology evoluton. As to an arbtrary peer, we can make use of the followng formula to compute the SPL from peer to the rest peers: spl = N \ ShortestPath(, (0 N\ Fgure 4. Comparson of average SPLs of both F peers and N peers n whch, N denotes the set of N peers, and N \ denotes the set of the remanng peers except peer. As demonstrated n Fg. 4, for EM, after 40 smulaton cycles, the average SPL from F peers to N peers nears a large value (as for AP, more F peers have dsconnected from the network n EM; the average SPL between N peers s close to a constant, roughly 2.8. However, to AP, after the same cycle, the correspondng values are 4.83 and 4.2, respectvely. Obvously, AP cannot effectvely drve F peers to the brm of the network. he man reason s that AP only takes advantage of the current local feedbacks to evolve the P2P topology, and neglect the real trust level n the whole transacton hstory, whch results n the stuaton that F peers cannot be clearly recognzed and dstngushed, and dffcult to be excluded to the brm of the network. Furthermore, he average SPL between N peers n AP s longer than that n EM, whch proves EM can make N peers get closer together to form a cluster, to gan a hgher search effcency than AP does. C. Effectveness aganst Malcous Peers hs smulaton s used to test whether the topology evoluton mechansm can effectvely bansh V peers to the brm of the network. Excludng V peers to the brm can decrease the negatve effect of malcous peers. Due to the long dstance between the peers lyng n the edge and those n the center, the servce requests from N peers are dffcult to reach V peers by settng a less L value. We smulate EM and AP at the same tme, and use the same SPL formula as (0. As shown n Fg. 5, so far as EM s concerned, after 55 smulaton cycles, the average SPL from V peers to N peers approaches a large value. hs result shows EM can bansh V peers to the brm of the network. In addton, the average SPL between N peers n EM s around 2.6. hus, we set a less value (for example, less than 3 to L, preventng N peers from recevng the servce lookups. In AP, after the same cycle, the correspondng values are 5.2 and 4, respectvely. hereby, AP cannot effectvely exclude V peers to the brm of the network. Smlar to the results n Secton B, the average SPL between N peers n AP s much more than that n EM, leadng to lower search effcency and hgher communcaton overhead n AP. Fgure 5. Comparson of average SPLs of both V peers and N peers D. Effectveness for rust Based Search Mechansm Assumng the P2P network s composed of a scale of peers, based on whch, the topology evoluton s executed. he trust values of peers are modeled by random dstrbuton, whose scope are confned to (0,. o smplfy the smulaton process, we choose such three trust value regons, as (0.4,0.5], (0.6,0.7] and (0.9,.0], named S, S 2 and S 3, respectvely. Here, we gve the concept of search effect. Defnton 6 Supposng the peer set peer has travelled across when t sends a search request through MFM s B. For an arbtrary peer ( B, assumng the dstance between peer and peer s d, we defne V = as the search mert peer put to peer. Defnton 7 As for B defned n Defnton 6, we defne E = V B as the search effect of peer at ths tme. Defnton 8 Wth respect to peer set S, we defne V B R = as the average search effect (ASE of peer S. S he varyng tendency of ASE of the three types of peers wth dfferent trust value regons wth topology evoluton s shown n Fg. 6. Wth topology evoluton, peers wth smlar trust values get together to form a cluster. MFM has a stronger effect on peers wth hgher trust values n the search effect. Addtonally, an mplct fact s that, due to the mmoderately search mechansm n classc unstructured P2P applcatons, the topology mposes no lmtatons and restrctons on the hghly trusted peers and the lowly trusted peers, resultng n severe tragedy of commons. On the contrary, n terms of the topology evoluton mechansm n EM, wth the lowly trusted peers dvertng away from the hghly trusted peers, and the effect of MFM, the probablty that the lowly d

7 JOURNAL OF COMMUNICAIONS, VOL. 3, NO. 7, DECEMBER Fgure 7. Comparson of the ERRs Fgure 6. he varyng tendency of ASE for three types of peers wth topology evoluton trusted peer reach the hghly trusted peer s becomng smaller gradually. hus, EM can restrct tragedy of commons at the cost of decreasng the search effect of lowly trusted peers. E. Effectveness for Incentng Well-Behaved Peers he ndex of the network effectveness for N peers s used to descrbe how the collaboratve peers obtan trusted resources. Here, we utlze the effectve response rate (ERR to measure the network effectveness. ERR: Supposng V r good represents the set of the collaboratve peers who ntate search requests durng some cycle, and receve the correspondng responses. As for the request submtted by peer, r responses are receved, r a of whch are provded by the collaboratve peers. hus, we can defne ERR as follow: a r ERR r =. hus, we can get: r ERR ERR = r. V Vgood good In Fg. 7, we compare the ERR for EM wth that for AP, when the proporton between F peers and N peers s :4. Snce AP utlzes the concept of the connecton trust, the ERR for AP ncreases fast at the begnnng. However, wth the smulaton cycles growng, the V peers n EM are dentfed rapdly to be banshed to the brm of the network. herefore, the ERR for EM exceeds that for AP after the 0 th cycle, and reach after the 290 th cycle, whle the ERR for AP s only about 0.84, after 800 smulaton cycles. We can see from Fg. 7, that EM show more effectveness than AP. Snce EM can converge the well-behaved peers wth smlar nterests nto a cluster more effectvely, these peers n the cluster can gan hgh ERR more easly. However, AP regulates P2P topology only based on the current transacton records of neghborng peers, and cannot reflect the real trust level of peers. hus, whether the well-behaved peers or the malcous peers cannot be accurately evaluated and dentfed, whch causes a negatve effect on the topology evoluton mechansm. VI. CONCLUSIONS AND FUURE WORK In ths paper, we provde a FC-based global trust model. Based on ths, a trust-based adaptve topology evoluton mechansm for P2P networks s gven. EM can regulate P2P topology n lght of the peer s global trust level, ensurng the farness of the topology evoluton. he mechansm can suppress the malcous behavors of peers effectvely, and also has the ncentve effect on all peers. Our prelmnary experments show that EM show more effectveness and robustness n ncentve effect than the exstng topology evoluton mechansm. However, we have not dscussed the communcaton overhead. hs ndex s one of the key factors for the successful deployment and effectve mplementaton n the real engneerng envronment for EM. In our future works, we wll present concrete expermental smulaton and theoretcal analyss for the communcaton overhead of EM wth topology evaluaton, and make tests n real local applcatons. o ths end, we should make further mprovements for EM n the mechansm performance. ACKNOWLEDGMEN he authors acknowledge the useful comments from the anonymous revewers. hs research was supported by the Natonal Grand Fundamental Research Program (973 Program of Chna under Grand No. 2005CB32800, the Natonal Hgh echnology Research and Development Program (863 Program of Chna under Grant No. 2007AA0030, and the Natonal Scence Foundaton for Dstngushed Young Scholars of Chna under Grant No REFERENCES [] Bawa M, Cooper BF, Crespo A, Daswan N, Ganesan P, Garca-Molna H, Kamvar S, Mart S, Schlosser M, Sun Q, Vnograd P, Yang B. Peer-to-Peer research at Stanford. ACM SIGMOD Record, 2003,32(3: [2] Dou W. he research on trust-aware P2P topologes and constructng technologes [Ph.D. hess]. Changsha: Natonal Unversty of Defense echnology, 2003 (n Chnese wth Englsh abstract. [3] E. Adar and B. Huberman. Free rdng on gnutella. Frst Monday, 5(0, October [4] F. Cornell, E. Daman, S. D. C. d Vmercat, S. Parabosch, and P. Samarat. Choosng reputable servents n a p2p network. In th Internatonal WWW Conference, [5] R. Dngledne, M. J. Freedman, and D. Molnar. he free haven proect: Dstrbuted anonymous storage servce. In Workshop on Desgn Issues n Anonymty and Unobservablty, [6] Xong L, Lu L. Peerrust: Supportng reputaton-based trust n peer-to-peer communtes. IEEE ransactons on Data and Knowledge Engneerng, Specal Issue on Peer-to-Peer Based Data Management, 2004, 6(7: [7] Kamwar S. D, Schlosser M., Hector Garca-Molna. he egenrust algorthm for reputaton management n P2P networks. In : Proceedngs of the 2th Internatonal

8 0 JOURNAL OF COMMUNICAIONS, VOL. 3, NO. 7, DECEMBER 2008 Conference on World Wde Web, Budapest, Hungary, 2003, [8] Stoca I, Morrs R, Karger D, Kaashoek MF, Balakrshnan H. Chord: A scalable peer-to-peer lookup servce for Internet applcatons. echncal Rept :R-89, MI, [9] S. Ratnasamy et al. A Scalable Content-Addressable Network. Proceedng of ACM SIGCOMM,ACM Press, NewYork, 200.8, pp [0] A.Rowstron,P.Druschel, Pastry: Scalable, dstrbuted obect locaton and routng for large-scale peer-to-peer systems. IFIP/ACM Internatonal Conference on Dstrbuted Systems Platforms, Kluwer Academc Press, 200., pp [] Cooper BF, Garca-Molna H. Ad hoc, self-supervsng peer-to-peer search networks. echncal Report, Stanford Unversty, [2] Lv Q, Ratsnasamy S, Shenker S. Can heterogenety make Gnutella scalable? In: Druschel P, Kaashoek M F, Rowstron AI, eds. Proc. of the st Int l Workshop on P2P Systems. Berln: Sprnger-Verlag, [3] Chawathe Y, Ratnasamy S, Breslau L, Shenker S. Makng Gnutella-lke P2P systems scalable. In: Crowcroft J, Wetherall D, eds. Proc. of the Conf. on Applcatons, echnologes, Archtectures, and Protocols for Computer Communcatons. New York: ACM Press, [4] Lu Y, Zhuang Zh, Xao L, N LM. AOO: Adaptve overlay topology optmzaton n unstructured P2P systems. In: Proc. of the IEEE GLOBECOM San Francsco, [5] Xao L, Lu Y, N LM. Improvng unstructured peer-to-peer systems by adaptve connecton establshment. IEEE rans. on Computers, 2005, 54(9: [6] Conde, Kamvar SD, Garca-Molna H. Adaptve peer-to-peer topologes. In: Lambrx P, Duma C, eds. Proc. of the 4th Int l Conf. on Peer-to-Peer Computng. New York: IEEE Press, [7] J.Altman. PKI Securty for JXA Overlay Networks. Sun Mcrosystem, Palo Alto, ech Rept: R-I ,2003. Hu et al. Dstrbuted and effectve reputaton mechansm n p2p systems. In: Proceedngs of the 2008 Internatonal Conference on Computer Scence and Software Engneerng. Wuhan, Chna, December 2-4, Janl Hu et al. RBrust: a recommendaton belef based dstrbuted trust management model for p2p networks. In: Proceedngs of the 2008 Internatonal Workshop on Massve Network Storage Systems and echnologes. Dalan, Chna, September, 25-7, Hs current research nterests nclude moble agent computng, P2P computng, grd computng, electronc commerce, and network securty. Dr. Hu s a member of CCF. He was awarded the Mechancal Engneerng College Specal Research Prze n Appled Scence n 2006 as the hghest standng graduate n the faculty of Appled Scence. Bn Zhou s an assocate professor n the School of Computer of the Natonal Unversty of Defense echnology (NUD, Changsha, Hunan, Chna. He receved hs BS, MS and Ph.D. degrees n computer scence from NUD, n 994, n 997, and n 2000, respectvely. Hs nterests are n dstrbuted computng technology and data mnng technology. Quanyuan Wu, as a doctoral supervsor, s a professor n computer scence n the School of Computer of the Natonal Unversty of Defense echnology. Hs research nterests are n artfcal ntellgence, dstrbuted computng, mddleware applcaton. Janl Hu was born n Wuhan, Hube, Chna, n January, 9th, 976. He receved hs B. E. degree n computer scence n 999, from the Mechancal Engneerng College, Shazhuang, Chna. In 2003, he receved hs M. E. degree n mltary commend from Mltary Command Insttute, Zhangakou, Chna, and n 2006, he receved hs Ph.D. degree n computer scence from the Mechancal Engneerng College, Shazhuang, Chna. He has attended many proect research, many of whch were n part supported by the Natonal Grand Fundamental Research Program (973 Program of Chna and Natonal Hgh echnology Research and Development Program (863 Program of Chna. He currently concentrates on P2P and trust research n the Computer School of the Natonal Unversty of Defense echnology, Changsha, Hunan, Chna, as a postdoctoral researcher. He has publshed many artcles n domestc and overseas core ournals or academc conferences, three of whch are ncludng: Janl Hu et al. FCrust: a robust and effcent feedback credblty-based dstrbuted trust model for p2p networks. In: Proceedngs of the 2008 Internatonal Symposum on rusted Computng. Zhangae, Chna, November 8-2, Janl

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS

AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS Lngku Meng a, Wenun Xe a, *, Dan Lu a, b a School of Remote Sensng and Informaton Engneerng, Wuhan Unversty, Wuhan 4379,

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Wireless Sensor Network Localization Research

Wireless Sensor Network Localization Research Sensors & Transducers 014 by IFSA Publshng, S L http://wwwsensorsportalcom Wreless Sensor Network Localzaton Research Lang Xn School of Informaton Scence and Engneerng, Hunan Internatonal Economcs Unversty,

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

Application of VCG in Replica Placement Strategy of Cloud Storage

Application of VCG in Replica Placement Strategy of Cloud Storage Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

Distributed Middlebox Placement Based on Potential Game

Distributed Middlebox Placement Based on Potential Game Int. J. Communcatons, Network and System Scences, 2017, 10, 264-273 http://www.scrp.org/ournal/cns ISSN Onlne: 1913-3723 ISSN Prnt: 1913-3715 Dstrbuted Mddlebox Placement Based on Potental Game Yongwen

More information

Professional competences training path for an e-commerce major, based on the ISM method

Professional competences training path for an e-commerce major, based on the ISM method World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng

More information

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI 216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent

More information

A high precision collaborative vision measurement of gear chamfering profile

A high precision collaborative vision measurement of gear chamfering profile Internatonal Conference on Advances n Mechancal Engneerng and Industral Informatcs (AMEII 05) A hgh precson collaboratve vson measurement of gear chamferng profle Conglng Zhou, a, Zengpu Xu, b, Chunmng

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors Optmal Fault-Tolerant Routng n Hypercubes Usng Extended Safety Vectors Je Wu Department of Computer Scence and Engneerng Florda Atlantc Unversty Boca Raton, FL 3343 Feng Gao, Zhongcheng L, and Ynghua Mn

More information

A Novel Distributed Collaborative Filtering Algorithm and Its Implementation on P2P Overlay Network*

A Novel Distributed Collaborative Filtering Algorithm and Its Implementation on P2P Overlay Network* A Novel Dstrbuted Collaboratve Flterng Algorthm and Its Implementaton on P2P Overlay Network* Peng Han, Bo Xe, Fan Yang, Jajun Wang, and Rumn Shen Department of Computer Scence and Engneerng, Shangha Jao

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

An Improved Image Segmentation Algorithm Based on the Otsu Method

An Improved Image Segmentation Algorithm Based on the Otsu Method 3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,

More information

Recommended Items Rating Prediction based on RBF Neural Network Optimized by PSO Algorithm

Recommended Items Rating Prediction based on RBF Neural Network Optimized by PSO Algorithm Recommended Items Ratng Predcton based on RBF Neural Network Optmzed by PSO Algorthm Chengfang Tan, Cayn Wang, Yuln L and Xx Q Abstract In order to mtgate the data sparsty and cold-start problems of recommendaton

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks

Performance Comparison of a QoS Aware Routing Protocol for Wireless Sensor Networks Communcatons and Network, 2016, 8, 45-55 Publshed Onlne February 2016 n ScRes. http://www.scrp.org/journal/cn http://dx.do.org/10.4236/cn.2016.81006 Performance Comparson of a QoS Aware Routng Protocol

More information

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

On Some Entertaining Applications of the Concept of Set in Computer Science Course

On Some Entertaining Applications of the Concept of Set in Computer Science Course On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han UNITY as a Tool for Desgn and Valdaton of a Data Replcaton System Phlppe Quennec Gerard Padou CENA IRIT-ENSEEIHT y Nnth Internatonal Conference on Systems Engneerng Unversty of Nevada, Las Vegas { 14-16

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

BRDPHHC: A Balance RDF Data Partitioning Algorithm based on Hybrid Hierarchical Clustering

BRDPHHC: A Balance RDF Data Partitioning Algorithm based on Hybrid Hierarchical Clustering 015 IEEE 17th Internatonal Conference on Hgh Performance Computng and Communcatons (HPCC), 015 IEEE 7th Internatonal Symposum on Cyberspace Safety and Securty (CSS), and 015 IEEE 1th Internatonal Conf

More information

A Clustering Algorithm for Chinese Adjectives and Nouns 1

A Clustering Algorithm for Chinese Adjectives and Nouns 1 Clusterng lgorthm for Chnese dectves and ouns Yang Wen, Chunfa Yuan, Changnng Huang 2 State Key aboratory of Intellgent Technology and System Deptartment of Computer Scence & Technology, Tsnghua Unversty,

More information

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems Real-tme Fault-tolerant Schedulng Algorthm for Dstrbuted Computng Systems Yun Lng, Y Ouyang College of Computer Scence and Informaton Engneerng Zheang Gongshang Unversty Postal code: 310018 P.R.CHINA {ylng,

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Research Article A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks

Research Article A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks Internatonal Dstrbuted Sensor Networks Volume 205, Artcle ID 64207, 8 pages http://dxdoorg/055/205/64207 Research Artcle A Game-Based Secure Localzaton Algorthm for Moble Wreless Sensor Networks Tanyue

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

Selective Flooding Based on Relevant Nearest-Neighbor using Query Feedback and Similarity across Unstructured Peer-to-Peer Networks

Selective Flooding Based on Relevant Nearest-Neighbor using Query Feedback and Similarity across Unstructured Peer-to-Peer Networks Journal of Computer Scence 5 (3):184-190, 009 ISSN 1549-3636 009 Scence Publcatons Selectve Floodng Based on Relevant Nearest-Neghbor usng Query Feedback and Smlarty across Unstructured Peer-to-Peer Networks

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

ServiceTrust: Trust Management in Service Provision Networks

ServiceTrust: Trust Management in Service Provision Networks ServceTrust: Trust Management n Servce Provson Networks Zhyuan Su *+ Lng Lu + Mngchu L * Xnxn Fan *+ Yang Zhou + *Software school, Dalan unversty of Technology, Dalan, Chna +College of computng, Georga

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

Research Article Information Transmission Probability and Cache Management Method in Opportunistic Networks

Research Article Information Transmission Probability and Cache Management Method in Opportunistic Networks Wreless Communcatons and Moble Computng Volume 2018, Artcle ID 1571974, 9 pages https://do.org/10.1155/2018/1571974 Research Artcle Informaton Transmsson Probablty and Cache Management Method n Opportunstc

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like:

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like: Self-Organzng Maps (SOM) Turgay İBRİKÇİ, PhD. Outlne Introducton Structures of SOM SOM Archtecture Neghborhoods SOM Algorthm Examples Summary 1 2 Unsupervsed Hebban Learnng US Hebban Learnng, Cntd 3 A

More information

EVALUATION OF THE PERFORMANCES OF ARTIFICIAL BEE COLONY AND INVASIVE WEED OPTIMIZATION ALGORITHMS ON THE MODIFIED BENCHMARK FUNCTIONS

EVALUATION OF THE PERFORMANCES OF ARTIFICIAL BEE COLONY AND INVASIVE WEED OPTIMIZATION ALGORITHMS ON THE MODIFIED BENCHMARK FUNCTIONS Academc Research Internatonal ISS-L: 3-9553, ISS: 3-9944 Vol., o. 3, May 0 EVALUATIO OF THE PERFORMACES OF ARTIFICIAL BEE COLOY AD IVASIVE WEED OPTIMIZATIO ALGORITHMS O THE MODIFIED BECHMARK FUCTIOS Dlay

More information

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

A Clustering Algorithm Solution to the Collaborative Filtering

A Clustering Algorithm Solution to the Collaborative Filtering Internatonal Journal of Scence Vol.4 No.8 017 ISSN: 1813-4890 A Clusterng Algorthm Soluton to the Collaboratve Flterng Yongl Yang 1, a, Fe Xue, b, Yongquan Ca 1, c Zhenhu Nng 1, d,* Hafeng Lu 3, e 1 Faculty

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

F Geometric Mean Graphs

F Geometric Mean Graphs Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.

More information

Two-Factor User Authentication in Multi-Server Networks

Two-Factor User Authentication in Multi-Server Networks Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan

More information

Structure Formation of Social Network

Structure Formation of Social Network Structure Formaton of Socal Network DU Nan 1, FENG Hu 2, HUANG Zgang 3, Sally MAKI 4, WANG Ru(Ruby) 5, and ZHAO Hongxa (Melssa) 6 1 Bejng Unversty of Posts and Telecommuncatons, Chna 2 Fudan Unversty,

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

A NOTE ON FUZZY CLOSURE OF A FUZZY SET

A NOTE ON FUZZY CLOSURE OF A FUZZY SET (JPMNT) Journal of Process Management New Technologes, Internatonal A NOTE ON FUZZY CLOSURE OF A FUZZY SET Bhmraj Basumatary Department of Mathematcal Scences, Bodoland Unversty, Kokrajhar, Assam, Inda,

More information

TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things

TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things DOI: 10.2298/CSIS110303056C TRM-IoT: A Trust Management Model Based on Fuzzy Reputaton for Internet of Thngs Dong Chen 1, Guran Chang 2, Dawe Sun 1, Jaa L 1, Je Ja 1, and Xngwe Wang 1 1 College of Informaton

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

A Distributed Dynamic Bandwidth Allocation Algorithm in EPON

A Distributed Dynamic Bandwidth Allocation Algorithm in EPON www.ccsenet.org/mas Modern Appled Scence Vol. 4, o. 7; July 2010 A Dstrbuted Dynamc Bandwdth Allocaton Algorthm n EPO Feng Cao, Demng Lu, Mnmng Zhang, Kang Yang & Ynbo Qan School of Optoelectronc Scence

More information

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 97-735 Volume Issue 9 BoTechnology An Indan Journal FULL PAPER BTAIJ, (9), [333-3] Matlab mult-dmensonal model-based - 3 Chnese football assocaton super league

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information