A Flexible Architecture for Creating Scheduling Algorithms as used in STK Scheduler

Size: px
Start display at page:

Download "A Flexible Architecture for Creating Scheduling Algorithms as used in STK Scheduler"

Transcription

1 A Flexble Archtecture for Creatng Schedulng Algorthms as used n STK Scheduler W. A. Fsher and Ella Herz Optwse Corporaton and Orbt Logc Incorporated fsher@optwse.com and ella.herz@orbtlogc.com Abstract A method of developng custom algorthms usng the Optwse schedulng system s presented. An overvew of the overall schedulng methodology s presented followed by a descrpton of how schedule algorthms may be customzed. Performance results for the commercal STK Scheduler regresson tests used to verfy algorthm codng enhancements and a case study are also provded. Introducton Schedulng a number of tasks to a pool of resources s a very common but dffcult problem. For example n [1] Barbulescu et al, demonstrated that a generalzed verson of the range schedulng problem s NP complete. Whle ths means that t may not be possble to construct an algorthm that can be proven to fnd the optmal soluton n fnte tme for the general problem, real world problems can have specfc condtons that make fndng good solutons possble. Most successful schedulng algorthms used n the real world explot specal condtons that allow the users to fnd good solutons. Orbt Logc and Optwse have found that a sngle algorthm for schedulng s not the best choce for all problems. By modfyng varous algorthm buldng blocks to meet both the desred soluton goals and schedulng constrants, customzed schedulng algorthms can be created that meet the needs of partcular mssons. The purpose of ths presentaton s to descrbe how the Optwse schedulng archtecture that s used n STK Scheduler can be adapted to specfc schedulng problems. An ntroducton to the Optwse algorthms was presented at the 2004 STK Users Conference [2]. An overvew of the custom algorthm nterface was ntroduced at the 2008 Copyrght 2013, All rghts reserved. STK Scheduler s Copyrght Orbt Logc Inc. STK s Copyrght Analytcal Graphcs Inc. STK Users Conference [3]. Some of that materal s updated here for completeness. Optwse and STK Scheduler STK Scheduler provdes the nterface and top level busness logc that translates a real world satellte task and resource problem nto the specfc language necessary for the Optwse algorthms to agnostcally fnd a schedule soluton. Fgure 1: STK Scheduler Task Defnton GUI STK Scheduler provdes the nterface for defnng the schedulng problem, confgurng the algorthms, as well as dsplayng the results. The user defnes resources and assocated attrbutes and then defnes tasks and ther accompanyng constrants and resource requrements and optons. Wth a seamless nterface to Systems Tool Kt (STK) the user can apply physcal constrants to the schedulng problem by selectng one or more STK computatons as resource avalablty or task schedulng constrants. The software then uses the Optwse algorthms to fnd de-conflcted, valdated schedule solutons whch can be vewed n table, Gantt, or 3D map vews. STK

2 Scheduler provdes both a graphcal and applcaton programmng nterface (API) for defnng and solvng schedulng problems and exportng the results. In the Optwse scheduler model tasks are assgned to tme slots. As shown n fgure 4a) each tme slot has an earlest start and a latest stop. The desred task duraton s assgned durng ths tme slot. The tme slot also has assocated wth t a profle. The profle s a contaner that allows one or a combnaton of resources to be defned. It s often the case that a task may be satsfed by more than one profle as shown n fgure 4 b). Fgure 2: STK Scheduler Gantt Vew Fgure 4: Tasks and profles Fgure 3: STK 3D Schedule Anmaton Wthn ths paradgm, the user can create and modfy plans manually or can employ one or many algorthms to solve the schedulng challenge. The user can also utlze the custom algorthm bulder to defne an algorthm specfc to ther schedulng problem. Regardless of the algorthm appled, a user may edt the resultng soluton f desred. Over 200 lcenses of STK Scheduler have been deployed nternatonaly supportng commercal, cvl, and mltary programs. The user lst ncludes Boeng, Harrs, Raytheon, Northrop Grumman, Booz Allen, Lockheed Martn, Honeywell, General Dynamcs, Orbtal Scences, TASC, Sctor, EADS, NASA. Pprograms supported by STK Scheduler nclude the Ar Force Satellte Control Network (AFSCN), SBIRS, SBSS, STSS, OSIRIS-REX, GLAST, WIRE, NASA Ground Network, and NFIRE. In addton, Orbtal Scences uses STK Scheduler for all launch and early orbt plannng for all of ther space launch vehcles (Taurus, Antares, Pegasus, Mnotaur). The STK Scheduler Model. In order to understand ts custom algorthms, t s mportant frst to understand the STK Scheduler model and how Optwse Algorthms ft nto that model. For example profle 1 mght be the combnaton of satellte A and ground staton A and profle 2 s the combnaton of satellte A and ground staton B. In STK Scheduler the soluton profles are derved from real world resource constrants, such as lne-of-ste access from a satellte to a ground staton, or lmted satellte onboard memory, or the tmes when an operator s avalable n the control center. STK Scheduler uses STK to model physcal constrants, and provdes a means for non-computed constrants to be defned as well. All task and resource constrants and computatons are used to generate wndows of opportunty that could be used to accomplsh the task for a gven resource profle. In STK Scheduler these wndows are called tmeslots. The process of creatng the feasble tmeslots can be smple (a pont-to-pont STK access calculaton) or complex (multple calls to STK access calculatons wth nternal STK constrants combned wth external user-defned generated constrants). Any number of resources may be specfed n a task profle defnton usng Boolean logc to allow a varety of resource combnaton optons for any task. In STK Scheduler each vald resource combnaton s called a profle. STK Scheduler then passes to Optwse a number of profle possbltes ncludng assocated computed tmeslots. Each profle and tmeslot also has a desrablty value assocated wth t. In STK Scheduler ths s used to nclude user resource and tme preferences (for nstance, t may be more desrable to schedule the task n an early tmeslot wth a specfc resource profle). Tasks may also have several other propretes ncludng prorty, desred start tme, and duraton types. Tasks can have fxed or varable duratons. Varable duraton tasks wll only be assgned f a mnmum duraton can be assgned, but wll be expanded up to a maxmum duraton

3 f possble. Tasks can also be defned to only be allowed to use one slot or to use multple slots. When multple slots are allowed the user also has the opton to allow the task to swtch resources between assgnments f needed to acheve the desred total assgnment duraton. K dur s used to adjust the relatve weght of assgnment tmes the duraton. Thus tasks wth longer duratons wll affect the FOM more than shorter ones. K desre s used to adjust the relatve weght of desrablty of the slot assgned to the task. K early s used to adjust the relatve weght of the early bonus. The early bonus s 1.0 f the task was scheduled as early as possble and zero f as late as possble for that task. K MaxBonus s used to adjust the relatve weght of the Max duraton bonus. It s 1.0 f maxmum duraton s scheduled and 0 f mnmum duraton s scheduled. K userstart s used to adjust the relatve weght of the userstart bonus. The userstart bonus s 1.0 f the task was scheduled as close to the desred user start and zero f far away as possble for that task. UserFunc s a lnk to external user functon. (dll) Fgure 5: Resource Usage As shown n fgure 5, the resources n a profle may be used durng, allotted at the start, or replenshed at the end of tasks. It s also possble defne a resource to be use or replensh at a rate. For example a partcular task may deplete a battery resource at partcular rate, and another task may charge the battery at dfferent rate. A setup resource may be defned for use pror to the tmeslot access. Note that ths resource s used outsde the tme slot tme. It s also possble to defne a breakdown tme. All resource levels and tme values are computed wth double numerc precson. All of these propertes are defned for each profle. It s also possble to defne task to task constrants such as task A must be some amount of tme after task B. One can also defne a mnmum and maxmum between tasks that have been defne to be n a group. Model Fgure of Mert The problem nput language also allows the user to adjust parameters n the fgure of mert that s used to measure the goodness of a soluton. K FOM Pr K task K UserFunc Ua 1 : assgned, assgn Ua KdurAssgnDur KdesreSlotDesre EarlyBonus K MaxBonus early userstart ( DesredStart Start ) 0 : unassgned K assgn s used to adjust the relatve weght for pure assgnment. Ths term s complementary to the next term. max The user s able to change the values of K values n the problem defnton fle n order to adjust how much each term contrbutes to the FOM. Algorthm Heurstc Classes Before gong nto the detals of the algorthm heurstcs t s useful to take a wder vew. The algorthms used fall nto two major classes, ordered algorthms that assgn tasks by tryng tme slots n some order and the neural algorthm whch uses a competton model. In the ordered type of algorthm, tme slots (and thus the correspondng tasks) are tred n some order. As tme slots are used for a task assgnment they may block future assgnments. In the left top panel of fgure 6 just such a case has occurred (It s assumed that the task requres all capacty of a resource). The slot consderaton order s shown by the numbers near the end of the slot. By gong n a dfferent order, two other solutons result n fully assgned schedules. In Fgure 6, three examples usng dfferent orders wth one pass are shown. In the top example only one task s assgned because the assgnment of task1 to slot 1 blocks the only avalable slot for task 2. The next two examples show slot checkng orders that result n full assgnment. It s also possble to use nformaton durng the process to modfy ths slot checkng order. Multple passes can be used to add addtonal tasks that may not be schedule n a sngle pass. For example, assume the last task to be consdered (and assgned) s one whch replenshes a resource. A second pass mght allow a task unassgned durng the ntal pass to be assgned to the replenshed resource. Repar heurstcs are mplemented by removng

4 a task from a fnshed schedule and then testng f other tasks (of hgher value) may be done. A Greedy algorthm can be mplemented by selectng the next slot based on ts possble mprovement to a Fgure of Mert. Whch detaled strategy s best depends on the specfc problem. Fgure 6: Tme slots consderaton order We wll return to the detals of how the varous ordered search algorthms can be constructed after a dscusson of the other class of algorthms. Fgure 7 shows an example of a second class of algorthm used n the solver engne. Ths method evolved from an analog neural network approach for the task assgnment problem suggested by Kennedy and Chua, 1998 [5] and nvestgated n [6]. We agan begn wth a model based on tme slots. Fgure 7: Neural Competton Each tme slot represents a possble way to assgn the task and has an assgnment probablty. All tme slots start wth an assgnment probablty near zero. Each tme slot probablty s allowed to grow subject to constrants. An example of one fundamental constrant s: the sum of the probabltes of two overlappng assgnments must be less or equal to one. The algorthm s desgned to shft the start tmes of the two tasks n conflct and to reduce the probabltes to resolve the conflct. The assgn the task only once constrant s creatng by requrng the sum of probabltes for all tme slots for a partcular task to be less than or equal to one. If the sum s greater than one then all tme slots n the sum are penalzed. If there s a resource capacty volaton at a partcular tme then the tme slots probabltes are penalzed and the start tmes of the tasks are adjusted to help clear the constrant. Ths s done for all tme slots smultaneously. Fgure 7 shows ths process for a two task problem. Note that n the mddle panel (at a hypothetcal teraton 100) the frst tmeslot probablty for task one s penalzed twce whle the other two tme slots probabltes are penalzed once. These two tme slots wll outgrow the doubly penalzed tmeslot eventually forcng the frst tme slot of task 1to a zero value. Ths allows task 2 the freedom to move earler n the schedule. The order of the tme slots s no longer a factor. The soluton s drven by the problem constrants. The soluton represents a maxmzaton of an underlyng objectve functon whch s to maxmze the number of assgnments. In the model mplemented for the schedulng algorthm engne the objectve functon maxmzes total assgned duraton. Although the example above goes to the optmal soluton, t s not the case f slot 1 s gven an ntal value sgnfcantly larger than slots 2 and 3. Ths llustrates another nterestng feature of usng such an algorthm. By varyng the values of the ntal nodes randomly, t s possble to generate a famly of solutons. Notce that unlke an ordered search algorthm there s no task or resource order rules; the constrants are feedback loops that constran the soluton space. Regresson Tests Results Optwse and Orbt Logc mantan a lbrary of over two hundred past problems that test the feature space of the scheduler. The regresson tests demonstrate the complexty and speed wth whch STK Scheduler and varous algorthms solve these problems. By runnng a varety of algorthms on a varety of problems, t s clear that one algorthm s not best for all problems. Most of the regresson tests contan less than 100 tasks and solve n less than a second wth most of the algorthms. They are mportant, but yeld lttle nformaton for evaluatng performance. Here we dscuss four of the most complex tests from a computaton pont of vew and two smaller test problems. All soluton tmes n ths secton were benchmarked on a 64 bt Intel Core GHz processor. The names have been replaced n the four customer derved cases. Table 1 gves an overvew of the dmenson

5 of the problems wth regard to the number of tasks, resources and tmeslots that are covered. name #tasks #resources #slots 15T2R OL-Ex Cust Cust Cust Cust Table 1: Regresson Test Dmensons The 15T2R test was desgned to have many tradeoffs nvolvng tasks resource conflcts. Wth ths setup, the Neural algorthm performs very well. However, despte what was desgned to be a stressng problem, the Random algorthm wth one tral found a full assgnment soluton. A more detaled analyss n [7] showed that the probablty of gettng a full soluton wth one run of Neural was 72 % and wth one run of random t was 48 %. All cases took less than a second to run. The FOM was programmed to reward total task duraton and earlest start. For fully assgned solutons hgher FOM measures how early the tasks were scheduled. Algorthm # assgned FOM OPS Sequental MPS Neural(1) Neural(100) Random(1) Random(100) Table 2: 15T2R Regresson Test Results The OL-Ex10 test contans 120 tasks and 30 resources usng four task types wth varyng fxed duraton tmes. STK accesses were obtaned for 10 hours assumng smultaneous access to a ground staton and some elevaton constrants. By usng a 10 hour tme perod, the total resource avalablty was reduced to a pont where the schedulng algorthms needed to do some real work. Ths problem s an example of one that s solved well by the Algorthm # assgned FOM OPS Sequental MPS Neural(1) Neural(100) Random(1) Random(100) Table 3: OL-ex10 Regresson Test Results Sequental algorthm. Only the Neural algorthm was capable of gettng a full soluton pror to the nventon of the Sequental algorthm. Notce that the Sequental algorthm has the hghest FOM score. That s because t has the tghtest packng of the tasks. The next four examples are all large problems derved from customer problems. All examples nclude varable duraton tasks whch can be expanded, but have lmted or no handover tasks. They are 1 or 2 day schedule perods wth mnmum duratons as small as 2 mnutes and maxmum duraton rangng from 5 mnutes to unlmted. In the regresson test each of the standard algorthms s run. The Neural and Random algorthms are run wth number of tres of 1 and 5. Table 4 shows the number of assgnments for each customer derved case wth each type of algorthm. Case OPS Seq MPS Neural Neural Ran Ran (1) (5) (1) (5) Table 4: Customer Regresson Test Results (Assgnments) Notce that no one algorthm stands out as best for these problems. The Random algorthm wth 5 tres appears to be the best. The MPS method s next n terms of performance. Note here that performance s analyzed based on the number of assgned tasks. Ths s not unusual when nteractng wth the STK Scheduler customer base. More tasks seem always to trump even the best constructed FOM score. Based on customer feedback t s clear that customers place a premum on predctablty. Unless one of the algorthms has found a soluton wth a much hgher assgnment percentage they wll use one pass or sequental. Both these algorthms were desgned to follow typcal human strategy. Case OPS Seq MPS Neural (1) Neural (5) Ran (1) Ran (5) Table 5: Customer Regresson Test Results (Soluton Tme) The most nterestng thng to note n the tme to solve metrc s that the Neural algorthm takes sgnfcantly longer than the rest for large problems. The Neural algorthm must set up a feedback network based on the number of tmeslots. In the case 2 and case 3 that s and tmeslots, respectvely. In ths problem most those nodes have no nteracton wth most of the other

6 nodes. Because these problems have weak nteractons between the resources most of the neural computaton s summng zeros. In ths case, the Neural algorthm s a bad choce. Whle not yet n the regresson test but under current development, we have done one problem whch had a request for 29,745 tasks to be assgned over a 24 hour perod usng 33 resources. There were an astoundng 1,710,462 possble accesses (tme slots). Usng a modfed verson of the nput routne and a custom algorthm very smlar to the Sequental algorthm (no expand) we were able to fnd a soluton wth 20,706 assgnments n 161 seconds. That s over 120 assgnments per second. Ths s an example a smple but extremely large problem. It llustrates effcency of the underlyng code and the ablty of the algorthm to handle large problems. The results of these regresson tests show that across a wde varety of schedulng problems wth dfferent performance crtera, there s no sngle best n the standard set of algorthm. Solver Archtecture and Custom Algorthms Next, we turn our attenton to the custom algorthm feature. The methodology that s used to fnd a schedule soluton s embedded n a solver engne that has been desgned from the ground up to be adaptable. It uses a run tme nterpreted scrpt language to defne the algorthm. scrpt, track solutons generated by the soluton scrpt and provde output back to the clent program (In ths case STK Scheduler). The hgh level manager s also the place n the code where strategy s added. Examples of such strategy wll emerge later n the dscusson. Each box ndcates the logcal flow of a typcal problem. The scrptng language parallels ths flow. These blocks also roughly ndcate the ndependence of the underlyng computaton. The code n some of these routnes has been optmzed over the past 10 years to allow near real tme turnaround for many typcal problems. Each component has also been desgned to be modfed. The basc structure of a soluton scrpt s shown n fgure 9. A soluton strng s a xml format fle that contans one or more tral specfcaton. A tral specfcaton contans steps and modfers. Steps are order specfc, modfers are not. At a mnmum, a tral must have a search step. All other parameters are optonal. Typcally a scrpt that uses an ordered search wll also have a sort step. Fgure 9: Soluton Scrpt Structure Fgure 8: Hgh Level Manager The job of the hgh level manager shown n fgure 8 s to parse the nput problem descrpton and nput soluton The archtecture allows up to three sort levels, each wth a parameter that defnes the preference for sortng. Sort parameters can be set to lst, prorty, early start, desrablty, slack, or random. For lst, prorty, and desrablty, the sort parameter can be set to ascendng or descendng. For random sorts, the randomzaton can be by task, profle, or tme slot. A randomzer allows a random choce from remanng slots f all the pror sort crtera are equal. The randomzer name determnes whether the randomzaton wll occur over all slots, slots assocated wth tasks or slots assocated wth profles. Use of a randomzer nstructs the manger to loop over the tral by the named varable number of tmes, randomzng the fnal varable. Ths allows a Monte-Carlo lke search

7 strategy to be mplemented. The soluton wth the best fgure of mert s chosen. Multple modfers can be selected and are not order dependent. The frst modfer s the use of Prorty Groups. If the Prorty Groups modfer s selected, slots are frst placed nto as many groups as there are unque prortes. Ths allows multple passes to be made over the slots n the group to obtan maxmum group assgnment before movng on to another prorty group. Whether or not prorty groups have been chosen as an opton, a sngle or multple dmensonal sort of the slots s avalable. The next two modfers deal wth the Fgure of Mert. Wth a Greedy Fgure of Mert modfer enabled, each tme an assgnment attempt s completed, the Fgure-of-Mert (FOM) s checked for all possble assgnments assumng success. The slot wth the largest possble ncrease n FOM s checked next. Ths mmcs a classc greedy heurstc but wth a user defnable FOM. The External Fgure-of-Mert modfer drects the engne to call an external method wthn a user modfable dll to calculate the Fgure of Method (FOM). There are a number of expand modfers because expand s a computatonally expensve operaton and expandng a task early n the assgnment process wll tend to block later assgnments. Havng the ablty to frst assgn the mnmum duraton requred to meet the task requrement and later expand duraton f t s possble has resulted n ablty to have maxmum task assgnment and extremely hgh resource usage. Expand modfers are: Expand after Each Try, Expand After Each Task, Expand Handover Task Up Front, and pre-assgn and Expand Soft Tasks. The pre-assgn and Expand Soft Resources modfer nstructs the manager to fnd tasks that use soft resources and assgn them frst. Soft resources are typcally rate resource that are consumed by some data tasks and replenshed by other. The resource also has a soft lmt to how much they can be replenshed. A typcal example s a battery recharge operaton from a solar collector. When the battery s full the chargng operaton s turned off automatcally at ts lmt. The easest way to model t s to have a task that s always on whenever there s sun access. The onboard system knows when the battery s full and soft resources fulfll the same functon. Fndng these tasks and makng sure they are on and fully expanded always mproves the changes of gettng tasks that wll requre the resource on. There are three possble search optons, ordered, neural and DS1MPS. No sort step s requred for the neural or DS1MPS. DS1MPS mplements code that mmcs the performance of the orgnal algorthms. It requres the manager to set up some specal trackng snce nternally t s equvalent to dong multple trals wth dfferent presorts. The fnal step opton s an output step. Whle t seems ths s essental, for STK Scheduler t s not needed because STK Scheduler s able to read the soluton strng from the Optwse schedulng object drectly wthout fle I/O. You mght want an output step f you wsh to have an addtonal fle wrtten at the end of a seres of trals. The fle format can be a tradtonal flat fle or xml and you can select from the last completed try from a tral (current) or the best soluton found thus far. Buldng Custom Algorthms Whle t s possble to create the custom scrpts by hand edtng, a GUI Algorthm Bulder s avalable from wthn STK Scheduler. The user can smply select the sort parameters from a lst, and chose behavor modfers from check boxes. A screenshot s shown n fgure 10. Fgure 10: STK Scheduler Custom Algorthm Bulder GUI The process s smple. Select a 1 2 or 3 dmensonal sort, use pull down lst to select a sort parameter (an A or D at the end of the parameter names means ascendng or descendng sort), select any modfers that are needed, f a randomzer or neural s used select the number of tres to use, select a maxmum tme to allow for a search, and select a output type f needed. When the add Tral to Soluton button s press an xml strng s added to the exstng soluton. You can have multple trals n a soluton. Example Soluton Strngs The soluton strng s a smple xml format strng. Each soluton strng can have one or more trals. If there s more than one tral than the manager keeps track of the best soluton based on the FOM. Note: the order of modfers s not mportant but step order s. A search s the only requred step. Slots wll reman n the order they were lsted n the nput descrpton fle f the sort step s omtted. It s possble to output a name value formatted or xml formatted outfle at the end of each tral. The nterface of the software module also allows the callng clent to retreve the soluton data wthout fle I/O. For example the

8 soluton strng that corresponds to the One Pass Algorthm n STK Scheduler s: <?xml verson= 1.0 encodng=utf-8?> <SolnProc> <Tral> <modfer> useprgrps </modfer> <modfer> expandalltasksatend </modfer> <step> Sort1(desreA) </step> <step> Search(ordered) </step> </Tral> </SolnProc> In the One Pass algorthm task are passed nto prorty groups and sorted by slot desrablty. If a slot has an dentcal prorty and slot desrablty then the lst order n the nput descrpton s used. Thus, f there are a number of tasks wth equal prorty and all slots have equal desrablty, then the frst task and slot n the nput fle lst order wll be tred. Snce the slots assocated wth a task tend to be wrtten n a group typcally the one pass algorthm wll search all slots for a partcular task before movng on to the next task. It s not a requrement that all slots for a task be wrtten at one tme, t s a tendency of most users. In STK Scheduler the desre parameter s used to adjust slot desrablty based on prorty of the resources n the profle and schedulng preferences. If default values are chosen then t s the same for all tme slots. It s however another way to adjust the algorthm performance. Makng one change to the strng; replacng Sort1(desreA) to Sort1(earlyStartA) changes the algorthm to match the Sequental Algorthm n the standard algorthms lsted n STK Scheduler. In the sequental algorthm slots are agan placed nto prorty groups. But now snce there s a sort(earlystarta) slots are sorted by ther slot start tme n ascendng order. Thus, the task wth the earlest possble slot start wll be tred frst. If the task assgnment s blocked, then whchever task that has the next earlest slot tme wll be tred. What happens f there are multple slots wth the same tme? The lst order of the slots s used. Ths algorthm s a drect mappng of a customer request. Many problems can be solved wth ths frst avalable approach and t tends to match a strategy that human schedulers are comfortable wth. The strng for the MultPass Algorthm s very smple: <Tral> <step> Search(DS1MPS) </step> <modfer> expandalltasksatend </modfer> </Tral>. The multpass algorthm was a frst generaton algorthm that used multple tres wth dfferent presorts to fnd the best soluton. Dependng on the number of resources n the problem t tres up to 32 dfferent presorts ncludng a phase n whch slots are randomze by profle. In order to be able to exactly match the orgnal algorthm performance, any step based sort parameters are gnored. MultPass nspred the custom algorthm approach. Rather than havng the presort selecton rules fxed n logc, t s now possble for the end user to create ther own. Somethng smlar to MPS could be created n a custom algorthm by usng multple trals. The strng neural algorthm s very smlar to the MPS strng: <Tral numtres= 5> <step> Search(DS1MPS) </step> <modfer> expandalltasksatend </modfer> </Tral>. As descrbed above the neural algorthm does not search n any order so a sort step s gnored. Notce that a new varable s now defned n the tral header, numtres=5. Ths nstructs the engne to do 5 runs of the neural scheduler usng random startng condtons each tme. Agan the best soluton based on the FOM s saved. Neural works best on problems n whch many tasks usng the same resources at nearly the same tmes. The fnal algorthm n the standard set of algorthms s STK Scheduler s Random. It was orgnally wrtten to be a base case for judgng performance. It turned out to be a great algorthm for problems where there were multple smlar resources and unform usage was desred. Such resources tended to have smlar but not qute dentcal access tmes. The soluton strng for random s <Tral numtres=30> <modfer> expandalltasksatend </modfer> <step> Sort1(ranDS1) </step> <step> Search(ordered) </step> </Tral>. The key dfference s that there s one sort parameter, rands1, whch s a specal verson of the random sort. rands1 exactly matches the way that slots were randomzed n the frst generaton random algorthm. It s most smlar to ranslot. The dfference s n how slots are randomzed. There are now many more optons for controllng how much a when randomzaton s appled. Randomzaton of the fnal varable s one example of a schedulng strategy that s added at the manager level of the software. The manager smply makes multple loops over a tral randomzng the varable and checkng the FOM. Repar as descrbed n [8] [9] can also be mplemented by modfyng ths level of codng. For repar the hgh level manager uses some method to select a porton or portons of a schedule soluton to freeze and then schedules around the partal soluton. The routnes that expand the task duraton at the end of the schedule are an example of repar behavor. Those routnes are clever enough to be able to move a task later n tme that s constranng the duraton expanson of a prmary task. NASA Case Study Example Next consder an example of a problem we nvestgated as part of a proposal to demonstrate the applcaton of STK Scheduler to the NASA Ground Staton Problem. For the problem we modeled a two week perod durng whch 41 spacecraft wth multple vew requests were assgned to one of 20 ground staton antennas. Snce each spacecraft msson was assgned a unque prorty, there were 41 prortes levels. Based on desred the number of desred

9 events per msson and the avalablty of the resources the feasblty modelng of STK Scheduler generated 4452 possble tasks and 158,069 tme slots. The customer also defned two goals. The prmary goal was to assgn the largest number of events to the hghest prorty mssons frst f possble. The secondary goal was to maxmze assgnment and match target resource usage as defne n an external spreadsheet. The purpose of the spreadsheet calculaton was to penalze solutons n whch an ndvdual resource dd not match contractually oblgated resource usage levels for some resources. Over usage ncurred addtonal charges whle under usage mpled wasted contract tme. The spread sheet calculaton computed a composte whch tred to capture these two goals but dd not strctly enforce the frst goal. The proposed fgure of mert was FOM = 1 + (100* A -1000*B - C)/D, where A = (number of events over desred), B = (number of events under desred), C = (ndvdual resource usage penalty), and D = ((501-pr)*number desred events). The sums are over the mssons except for C whch s over the resources. For the STK Scheduler modelng of ths problem, the number of tasks s equal to the number of desred events. It s not possble to assgn more than the desred number of events and A wll always be zero. The resultng FOM n form s 1- δ/k - C/K. (δ= 1 f a task s assgned and 0 f not). K s a new constant that correctly scales between the reduced form and the correct spreadsheet formula. The key pont s that δ s an avalable term n the exstng FOM. The C/K (penalty) term must be computed externally. Fgure 11 shows data beng exported from STK Scheduler to and Excel macro for calculaton of the NASA FOM. Fgure 11:NASA Case Study Archtecture The frst test was to try the exstng standard algorthms and gnore the penalty term and use data exported from STK to calculate the FOM. The best standard algorthm was the Sequental Algorthm. The second test was to use Algorthm Bulder to create a custom algorthm agan gnorng the penalty term. The best custom algorthm found was to add randomze profles to the sequental algorthm wth 50 tres. For the thrd test an external FOM was coded that was used to select the best soluton from the multple tres. Fnally, the greedy opton wth the external FOM was tred whch checks the delta FOM of all possble slots to choose the next slot to try. The external NASA FOM had to be modfed slghtly to allow a better delta FOM to be calculated. Table 6 shows how each algorthm fared wth regard to number of assgnments, FOM score, and the penalty score. It also shows the number of prorty assgnments mssed relatve to the best soluton at a specfc prorty level. Algorthm Assgned FOM Penalty # mssed relatve best at pr= Sequental at pr=16 Sequental wth random profle nternal FOM 50 tres Sequental wth random profle external FOM 200 tres Greedy External FOM 30 tres Table 6:NASA Case Study Results at pr= Best case prmary crtera at pr=6 It turns out the best soluton from a FOM pont of vew does not meet the prmary goal: assgn hgher prorty tasks before lower prorty f possble. The best FOM case of found wth Greedy, results n 2 fewer tasks assgned at prorty level = 6 than a case wth a FOM= To get the better FOM, assgnments were made to meet the target usage levels at the cost of total tasks because that s what the FOM sad was the trade-off. A human operator would probably not bump a hgher prorty task n order or take a lower total number of assgnments to obtan better resource usage. Another pont of comparson s tme to solve. All algorthms took around 10 seconds per try to solve the problem except for the Greedy FOM whch was sgnfcantly slower at over 300 seconds per try. Tryng to

10 add code that could search for very small mprovements n the external FOM was very expensve computatonally. On the other hand method 3 whch loosely coupled the external FOM but allowed for random searchng of the soluton space found the best soluton from the prmary goal pont of vew usng less computaton tme. Concluson In ths paper we have shown how creatng customzed algorthms usng STK Scheduler can be used to ncrease the value of schedule solutons. Optwse provdes the underlyng archtecture wth a flexble algorthm scrptng language and solver engne. On top of the Optwse archtecture, STK Scheduler provdes GUIs and APIs that allow the user to defne tasks and resources that can be ted to physcal constrants, buld specalzed algorthms, adjust the fgure-of-mert, run the algorthms, and vsualze the schedule results n a varety of formats. The value of the custom algorthm was shown n a NASA case study where a varety of custom algorthms were developed and compared wth regard to how well each soluton met a varety of specfc crtera. It s the desgn synergy between adaptable algorthms, schedule data management, flght dynamcs computatons and user nterfaces whch s requred to meet the aerospace schedulng challenges of today and tomorrow. [7] Fsher W. The Optwse Corporaton Schedulng Algorthms (As used n STK/Scheduler) In STK Scheduler product documentaton. [8] Zweben M. Davs E. Daun B. and Deale M. Schedulng and Reschedulng wth Iteratve Repar IEEE Transactons on Systems, Man Cybernectcs, Vol 23 No [9] Chen S., Knght R., Stechert A., Sherwood R., and Rabdeau G. Usng Iteratve Repar to Improve the Responsveness of Plannng and Schedulng Proceedngs of the Ffth Internatonal Conference on Artfcal Intellgence Plannng and Schedulng References [1] Barbulescu L., Watson J. Whtley L. and Howe A. Schedulng Space-Ground Communcatons for the Ar Force satellte Control Network Journal of Schedulng, Vol. 7, 2004 [2] Fsher W. Schedulng Algorthm Technology STK/Scheduler 2004 AGI Users Conference, July 2, 2004 [3] Fsher W. STK/Scheduler Next Generaton Schedulng Algorthms Under the Hood Presentaton 2008 AGI Users Conference, Oct 9, [4] Zegler,I. and George D. STK Scheduler Onlne Product Documentaton. http//orbtlogc.com/support/scheduler/frame.htm [5] Kennedy M. and Chua L., Neural Networks for Nonlnear Programmng, IEEE Transactons on Crcuts and Systems, Vol. 35, No.5, May 1988 [6] Fsher W., Fujmoto R., and Smthson R, A Programmable Analog Neural Network Processor, IEEE Transactons on Neural Networks, Vol. 2, No. 2, March 1991

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Smoothing Spline ANOVA for variable screening

Smoothing Spline ANOVA for variable screening Smoothng Splne ANOVA for varable screenng a useful tool for metamodels tranng and mult-objectve optmzaton L. Rcco, E. Rgon, A. Turco Outlne RSM Introducton Possble couplng Test case MOO MOO wth Game Theory

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

DLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements.

DLK Pro the all-rounder for mobile data downloading. Tailor-made for various requirements. DLK Pro the all-rounder for moble data downloadng Talor-made for varous requrements www.dtco.vdo.com Smply brllant, brllantly smple Always the rght soluton The DLK Pro s the VDO product famly, whch sets

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky Improvng Low Densty Party Check Codes Over the Erasure Channel The Nelder Mead Downhll Smplex Method Scott Stransky Programmng n conjuncton wth: Bors Cukalovc 18.413 Fnal Project Sprng 2004 Page 1 Abstract

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Lecture 4: Principal components

Lecture 4: Principal components /3/6 Lecture 4: Prncpal components 3..6 Multvarate lnear regresson MLR s optmal for the estmaton data...but poor for handlng collnear data Covarance matrx s not nvertble (large condton number) Robustness

More information

Brave New World Pseudocode Reference

Brave New World Pseudocode Reference Brave New World Pseudocode Reference Pseudocode s a way to descrbe how to accomplsh tasks usng basc steps lke those a computer mght perform. In ths week s lab, you'll see how a form of pseudocode can be

More information

ETAtouch RESTful Webservices

ETAtouch RESTful Webservices ETAtouch RESTful Webservces Verson 1.1 November 8, 2012 Contents 1 Introducton 3 2 The resource /user/ap 6 2.1 HTTP GET................................... 6 2.2 HTTP POST..................................

More information

Maintaining temporal validity of real-time data on non-continuously executing resources

Maintaining temporal validity of real-time data on non-continuously executing resources Mantanng temporal valdty of real-tme data on non-contnuously executng resources Tan Ba, Hong Lu and Juan Yang Hunan Insttute of Scence and Technology, College of Computer Scence, 44, Yueyang, Chna Wuhan

More information

CPE 628 Chapter 2 Design for Testability. Dr. Rhonda Kay Gaede UAH. UAH Chapter Introduction

CPE 628 Chapter 2 Design for Testability. Dr. Rhonda Kay Gaede UAH. UAH Chapter Introduction Chapter 2 Desgn for Testablty Dr Rhonda Kay Gaede UAH 2 Introducton Dffcultes n and the states of sequental crcuts led to provdng drect access for storage elements, whereby selected storage elements are

More information

NGPM -- A NSGA-II Program in Matlab

NGPM -- A NSGA-II Program in Matlab Verson 1.4 LIN Song Aerospace Structural Dynamcs Research Laboratory College of Astronautcs, Northwestern Polytechncal Unversty, Chna Emal: lsssswc@163.com 2011-07-26 Contents Contents... 1. Introducton...

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL)

Circuit Analysis I (ENGR 2405) Chapter 3 Method of Analysis Nodal(KCL) and Mesh(KVL) Crcut Analyss I (ENG 405) Chapter Method of Analyss Nodal(KCL) and Mesh(KVL) Nodal Analyss If nstead of focusng on the oltages of the crcut elements, one looks at the oltages at the nodes of the crcut,

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Decson surface s a hyperplane (lne n 2D) n feature space (smlar to the Perceptron) Arguably, the most mportant recent dscovery n machne learnng In a nutshell: map the data to a predetermned

More information

LS-TaSC Version 2.1. Willem Roux Livermore Software Technology Corporation, Livermore, CA, USA. Abstract

LS-TaSC Version 2.1. Willem Roux Livermore Software Technology Corporation, Livermore, CA, USA. Abstract 12 th Internatonal LS-DYNA Users Conference Optmzaton(1) LS-TaSC Verson 2.1 Wllem Roux Lvermore Software Technology Corporaton, Lvermore, CA, USA Abstract Ths paper gves an overvew of LS-TaSC verson 2.1,

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

11. HARMS How To: CSV Import

11. HARMS How To: CSV Import and Rsk System 11. How To: CSV Import Preparng the spreadsheet for CSV Import Refer to the spreadsheet template to ad algnng spreadsheet columns wth Data Felds. The spreadsheet s shown n the Appendx, an

More information

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany

More information

Biostatistics 615/815

Biostatistics 615/815 The E-M Algorthm Bostatstcs 615/815 Lecture 17 Last Lecture: The Smplex Method General method for optmzaton Makes few assumptons about functon Crawls towards mnmum Some recommendatons Multple startng ponts

More information

Greedy Technique - Definition

Greedy Technique - Definition Greedy Technque Greedy Technque - Defnton The greedy method s a general algorthm desgn paradgm, bult on the follong elements: confguratons: dfferent choces, collectons, or values to fnd objectve functon:

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

A Facet Generation Procedure. for solving 0/1 integer programs

A Facet Generation Procedure. for solving 0/1 integer programs A Facet Generaton Procedure for solvng 0/ nteger programs by Gyana R. Parja IBM Corporaton, Poughkeepse, NY 260 Radu Gaddov Emery Worldwde Arlnes, Vandala, Oho 45377 and Wlbert E. Wlhelm Teas A&M Unversty,

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

5 The Primal-Dual Method

5 The Primal-Dual Method 5 The Prmal-Dual Method Orgnally desgned as a method for solvng lnear programs, where t reduces weghted optmzaton problems to smpler combnatoral ones, the prmal-dual method (PDM) has receved much attenton

More information

SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR

SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR Judth Aronow Rchard Jarvnen Independent Consultant Dept of Math/Stat 559 Frost Wnona State Unversty Beaumont, TX 7776 Wnona, MN 55987 aronowju@hal.lamar.edu

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science EECS 730 Introducton to Bonformatcs Sequence Algnment Luke Huan Electrcal Engneerng and Computer Scence http://people.eecs.ku.edu/~huan/ HMM Π s a set of states Transton Probabltes a kl Pr( l 1 k Probablty

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Feature Reduction and Selection

Feature Reduction and Selection Feature Reducton and Selecton Dr. Shuang LIANG School of Software Engneerng TongJ Unversty Fall, 2012 Today s Topcs Introducton Problems of Dmensonalty Feature Reducton Statstc methods Prncpal Components

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT 3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions

Sorting Review. Sorting. Comparison Sorting. CSE 680 Prof. Roger Crawfis. Assumptions Sortng Revew Introducton to Algorthms Qucksort CSE 680 Prof. Roger Crawfs Inserton Sort T(n) = Θ(n 2 ) In-place Merge Sort T(n) = Θ(n lg(n)) Not n-place Selecton Sort (from homework) T(n) = Θ(n 2 ) In-place

More information

Oracle Database: SQL and PL/SQL Fundamentals Certification Course

Oracle Database: SQL and PL/SQL Fundamentals Certification Course Oracle Database: SQL and PL/SQL Fundamentals Certfcaton Course 1 Duraton: 5 Days (30 hours) What you wll learn: Ths Oracle Database: SQL and PL/SQL Fundamentals tranng delvers the fundamentals of SQL and

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

TPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints

TPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints TPL-ware Dsplacement-drven Detaled Placement Refnement wth Colorng Constrants Tao Ln Iowa State Unversty tln@astate.edu Chrs Chu Iowa State Unversty cnchu@astate.edu BSTRCT To mnmze the effect of process

More information

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics Introducton G10 NAG Fortran Lbrary Chapter Introducton G10 Smoothng n Statstcs Contents 1 Scope of the Chapter... 2 2 Background to the Problems... 2 2.1 Smoothng Methods... 2 2.2 Smoothng Splnes and Regresson

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming CS 4/560 Desgn and Analyss of Algorthms Kent State Unversty Dept. of Math & Computer Scence LECT-6 Dynamc Programmng 2 Dynamc Programmng Dynamc Programmng, lke the dvde-and-conquer method, solves problems

More information

12/2/2009. Announcements. Parametric / Non-parametric. Case-Based Reasoning. Nearest-Neighbor on Images. Nearest-Neighbor Classification

12/2/2009. Announcements. Parametric / Non-parametric. Case-Based Reasoning. Nearest-Neighbor on Images. Nearest-Neighbor Classification Introducton to Artfcal Intellgence V22.0472-001 Fall 2009 Lecture 24: Nearest-Neghbors & Support Vector Machnes Rob Fergus Dept of Computer Scence, Courant Insttute, NYU Sldes from Danel Yeung, John DeNero

More information

Notes on Organizing Java Code: Packages, Visibility, and Scope

Notes on Organizing Java Code: Packages, Visibility, and Scope Notes on Organzng Java Code: Packages, Vsblty, and Scope CS 112 Wayne Snyder Java programmng n large measure s a process of defnng enttes (.e., packages, classes, methods, or felds) by name and then usng

More information

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach Data Representaton n Dgtal Desgn, a Sngle Converson Equaton and a Formal Languages Approach Hassan Farhat Unversty of Nebraska at Omaha Abstract- In the study of data representaton n dgtal desgn and computer

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Dynamic Camera Assignment and Handoff

Dynamic Camera Assignment and Handoff 12 Dynamc Camera Assgnment and Handoff Br Bhanu and Ymng L 12.1 Introducton...338 12.2 Techncal Approach...339 12.2.1 Motvaton and Problem Formulaton...339 12.2.2 Game Theoretc Framework...339 12.2.2.1

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

Array transposition in CUDA shared memory

Array transposition in CUDA shared memory Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some

More information

Active Contours/Snakes

Active Contours/Snakes Actve Contours/Snakes Erkut Erdem Acknowledgement: The sldes are adapted from the sldes prepared by K. Grauman of Unversty of Texas at Austn Fttng: Edges vs. boundares Edges useful sgnal to ndcate occludng

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Concurrent models of computation for embedded software

Concurrent models of computation for embedded software Concurrent models of computaton for embedded software and hardware! Researcher overvew what t looks lke semantcs what t means and how t relates desgnng an actor language actor propertes and how to represent

More information

Optimal Scheduling of Capture Times in a Multiple Capture Imaging System

Optimal Scheduling of Capture Times in a Multiple Capture Imaging System Optmal Schedulng of Capture Tmes n a Multple Capture Imagng System Tng Chen and Abbas El Gamal Informaton Systems Laboratory Department of Electrcal Engneerng Stanford Unversty Stanford, Calforna 9435,

More information

Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits

Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits Repeater Inserton for Two-Termnal Nets n Three-Dmensonal Integrated Crcuts Hu Xu, Vasls F. Pavlds, and Govann De Mchel LSI - EPFL, CH-5, Swtzerland, {hu.xu,vasleos.pavlds,govann.demchel}@epfl.ch Abstract.

More information

CS1100 Introduction to Programming

CS1100 Introduction to Programming Factoral (n) Recursve Program fact(n) = n*fact(n-) CS00 Introducton to Programmng Recurson and Sortng Madhu Mutyam Department of Computer Scence and Engneerng Indan Insttute of Technology Madras nt fact

More information

mquest Quickstart Version 11.0

mquest Quickstart Version 11.0 mquest Quckstart Verson 11.0 cluetec GmbH Emmy-Noether-Straße 17 76131 Karlsruhe Germany www.cluetec.de www.mquest.nfo cluetec GmbH Karlsruhe, 2016 Document verson 5 27.04.2016 16:59 > Propretary notce

More information

3D vector computer graphics

3D vector computer graphics 3D vector computer graphcs Paolo Varagnolo: freelance engneer Padova Aprl 2016 Prvate Practce ----------------------------------- 1. Introducton Vector 3D model representaton n computer graphcs requres

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Topology Design using LS-TaSC Version 2 and LS-DYNA

Topology Design using LS-TaSC Version 2 and LS-DYNA Topology Desgn usng LS-TaSC Verson 2 and LS-DYNA Wllem Roux Lvermore Software Technology Corporaton, Lvermore, CA, USA Abstract Ths paper gves an overvew of LS-TaSC verson 2, a topology optmzaton tool

More information

Alufix Expert D Design Software #85344

Alufix Expert D Design Software #85344 238 ALUFIX SOFTWARE Alufx Expert 2014 3D Desgn Software #85344 Alufx Expert software makes automatc desgns for fxtures wth correspondng partlsts. You choose the system and defne clampng ponts. The software

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information