Detection and Avoidance Deadlock for Resource Allocation in Heterogeneous Distributed Platforms

Size: px
Start display at page:

Download "Detection and Avoidance Deadlock for Resource Allocation in Heterogeneous Distributed Platforms"

Transcription

1 Internatonal Journal of Coputer Scence and Telecouncatons [Volue 6, Issue 2, February 2015] 1 ISSN Detecton and Avodance Deadlock for Resource Allocaton n Heterogeneous Dstrbuted Platfors Ha Huy Cuong Nguyen 1 and Van Son Le 2 1 Departent of Inforaton Technology, QuangNa Unversty, Ta Ky Cty, Vet Na 2 Departent of Inforaton Technology, Da Nang Unversty of Educaton, Da Nang, Vet Na 1 nguyenhahuycuong@gal.co, 2 levansupha2004@yahoo.co Abstract In a heterogeneous dstrbuted platfors large proble s dstrbute aong the processors (such as aong the coputers of dstrbuted coputng syste or aong the coputers of parallel coputng syste etc.) to ake t cost effectve and less te consung nstead of a coputer syste wth sngle processor. There are ore general types of resource allocaton probles than those we consder here. In ths paper, we present an approach for provng detecton and avodance algorth, to schedule the polces of resource supply for resource allocaton on heterogeneous. We propose an algorth for allocatng ultple resources to copetng servces runnng n vrtual achnes platfors. Index Ters Cloud Coputng, Resource Allocaton, Heterogeneous Dstrbuted Platfors, Deadlock Detecton and Avodance Deadlock R I. INTRODUCTION ECENTLY, there has been a draatc ncrease n the popularty of cloud coputng systes that rent coputng resources on-deand, bll on a pay-as-you-go bass, and ultplex any users on the sae physcal nfrastructure. These cloud coputng envronents provde an lluson of nfnte coputng resources to cloud users that they can ncrease or decrease ther resources. In any cases, the need for these resources only exsts n a very short perod of te. The ncreasng use of vrtual achne technology n data centers, both leadng to and renforced by recent nnovatons n the prvate sector aed at provdng low-antenance cloud coputng servces, has drven research nto developng algorths for autoatc nstance placeent and resource allocaton on vrtualzed platfors[1], [2], ncludng our own prevous work. Most of ths research has assued a platfor consstng of hoogeneous nodes connected by a cluster. However, there s a need for algorths that are applcable to heterogeneous platfors. Heterogenety happens when collectons of hoogeneous resources forerly under dfferent adnstratve doans are federated and lead to a set of resources that belong to one of several classes. Ths s the case when federatng ultple clusters at one or ore geographcal locatons e.g., grd coputng, sky coputng. In ths work we propose vrtual achne placeent and resource allocaton deadlock detecton algorths that, unlke prevous proposed algorths, are applcable to vrtualzed platfors that coprse heterogeneous physcal resources. More specfcally, our contrbutons are: We provde an algorthc approach to detect deadlock and resource allocaton ssues n the vrtualzaton platfor heterogenety. Ths algorth s n fact ore general, even for heterogeneous platfors, and only allowed to allocate nal resources to eet QoS arbtrary force. Usng ths algorth, we extend prevously proposed algorths to the heterogeneous case. We evaluate these algorths va extensve sulaton experents, usng statstcal dstrbutons of applcaton resource requreents based on a real-world dataset provded by Google. Most resource allocaton algorths rely on estates regardng the resource needed for vrtual achne nstances, and do not refer to the ssue of detectng and preventng deadlocks. We studed the pact of estaton errors and propose dfferent approaches to tgate these errors, and dentfy a strategy that works well eprcally. II. RELATED WORKS Resource allocaton n cloud coputng has attracted the attenton of the research county n the last few years. Srkantaah et al. [8] studed the proble of request schedulng for ult-tered web applcatons n vrtualzed heterogeneous systes n order to nze energy consupton whle eetng perforance requreents. They proposed a heurstc for a ultdensonal been packng proble as an algorth for workload consoldaton. Garg et al. [10] proposed near optal schedulng polces that consder a nuber of energy effcency factors, whch change across dfferent data centers dependng on ther locaton, archtectural desgn, and anageent syste. Warneke et al. [11] dscussed the challenges and opportuntes for effcent data processng n cloud envronent and presented a data Journal Hoepage:

2 Ha Huy Cuong Nguyen and Van Son Le 2 processng fraework to explot the dynac resource provsonng offered by IaaS clouds. Wu et al. [12] propose a resource allocaton for SaaS provders who want to nze nfrastructure cost and SLA volatons. Adds et al. [13] proposed resource allocaton polces for the anageent of ult-ter vrtualzed cloud systes wth the a to axze the profts assocated wth ultple class SLAs. A heurstc soluton based on a local search that also provdes avalablty, guarantees that runnng applcatons have developed. Abdelsale et al. [14] created a atheatcal odel for power anageent for a cloud coputng envronent that prarly serves clents wth nteractve applcatons such as web servces. The atheatcal odel coputes the optal nuber of servers and the frequences at whch they should run. Yazr et al. [15] ntroduced a new approach for dynac autonoous resource anageent n coputng clouds. Ther approach conssts of a dstrbuted archtecture of NAs that perfor resource confguratons usng MCDA wth the PROMETHEE ethod. Our prevous works anly dealt wth resource allocaton, QoS optzaton n the cloud coputng envronent. There are ore general types of resource allocaton probles than those we consder here. For nstance: 1. We consder the possblty that user ght be wllng to accept alternatve cobnatons of resources. For exaple, a user ght request eleentary capacty CPU,, HDD rather than a specfc. 2. We consder the possblty that resources ght be shared. In ths case, soe sharng s typcally pertted; for exaple, two transactons that need only to read an obect can be allowed concurrent access to the obect. 3. We begn by defnng our generalzed resource allocaton proble, ncludng the deadlock detecton proble as an nterestng specal case. We then gve several typcal solutons. III. SYSTEM MODEL RESOURCE ALLOCATION IN HETEROGENEOUS DISTRIBUTED PLATFORMS Resource allocaton n cloud coputng has attracted the attenton of the research county n the last few years. Cloud coputng presents a dfferent resource allocaton paradg than ether grds or batch schedulers [2]. In partcular, Aazon C2 [10], s equpped to, handle ay saller coputer resource allocatons, rather than a few, large request as s norally the case wth grd coputng. The ntroducton of heterogenety allows clouds to be copettve wth tradtonal dstrbuted coputng systes, whch often consst of varous types of archtecture as well. Lke tradtonal dstrbuted syste before we can see a heterogeneous dstrbuted syste conssts of a set of processes that are connected by a councaton network. The councaton delay s fnte but unpredctable [21], [22]. A). The Applcaton A heterogeneous dstrbuted progra s coposed of a set of n asynchronous processes p 1, p 2,,p n that councates by essage passng over the councaton network. We assue that each process s runnng on a dfferent processor. The processor does not share a coon global eory and councate solely by passng essages over the councaton network. There s no physcal global clock n the syste to whch processes have nstaneous access. The councaton edu ay delver essages out of order, essages ay be lost garble or duplcated due to teout and retranssson, processors ay fal and councaton lnks ay go down. The syste can be odeled as a drected graph n whch vertces represent the processes and edge represent undrectonal councaton channels. We use the platfor graph, for the grd platfor. We odel a collecton of heterogeneous resources and the councaton lnks between the as the nodes and edges of an undrected graph. See an exaple n Fg. 1 wth 8 processors and 11 councaton lnks. Each node s a coputng resource (a processor, or a cluster, or node). P8 P3 P5 P1 P6 P4 Fg. 1. An exaple sple platfor A process can be n two states: runnng or blocked. In the runnng state (also called actve state), a process has all the needed re and s ether executng or s ready for executon. In the blocked state, a process s watng to acqure soe resource. B). The Archtecture The target heterogeneous platfor s represented by a drected graph, the platfor graph. There are p nodes P 1, P 2,, P n that represent the processors. In the exaple of fgure 1 there at eght processors, hence n = 8. Each edge represents a physcal nterconnecton. Each edge e : P P s labeled by value c, whch represents the te to transfer a essage of unt length between P and P, n ether drecton: we assue that the lnk between P and P s bdrectonal and syetrc. A varant would be to assue two undrectonal lnks, one n each drecton, wth possbly dfferent label values. If there s no councaton lnk between P and P we let c, = +, so that c, < + eans that P and P are neghbors n the councaton graph. C). Wat For Graph (WFG) In dstrbuted systes, the sate of the syste can be odeled by drected graph, called a wat for graph (WFG) [21] [25]. In a WFG, nodes are processors and there s a drected edge fro node P 1 to ode P 2 f P 1 s blocked and s P2 P7

3 Internatonal Journal of Coputer Scence and Telecouncatons [Volue 6, Issue 2, February 2015] 3 watng for P 2 to release soe resource. A syste s deadlocked f and only f there exsts a drected cycle or knot n the WFG. Let us frst of all descrbe the deadlock condton proble ore precsely. A set S = {s 1, s 2, s k } of k > 1 enttes s deadlocked when the followng two condtons sultaneously hold: Each entty s S s watng for an event persson that ust be generated fro another entty n the set; No entty s S can generate a persson whle t s watng. If these two condtons hold, the enttes n the set wll be watng forever, regardless of the nature of the persson and of why they are watng for the persson ; for exaple, t could be because s needs a resource held by s n order to coplete ts coputaton. A useful way to understand the stuatons n whch deadlock ay occur s to descrbe the status of the enttes durng a coputaton, wth respect to ther watng for soe events, by eans of a drected graph W, called wat-for graph. Deadlock detecton can be represented by a Resource Allocaton Graph (RAG), coonly used n operatng systes and dstrbuted systes. A RAG s defned as a graph (V,E) where V s a set of nodes and E s a set of ordered pars or edges (v,v ) such that v,v V. V s further dvded nto two dsont subsets: P { p0, p1, p2,..., p } where P s a set of processor nodes shown as crcles n Fgure 1; and where Q s a set of resource nodes Q q0 q1 q2 q n {,,,..., } shown as boxes n Fgure 1. A RAG s a graph bpartte n the P and Q sets. An edge e =(p,q ) s a request edge f and only f p P, q Q. The axu nuber of edges n a RAG s n. A node s a snk when a resource (processor) has only ncong edge(s) fro processor(s) (resource(s)). A node s source when a resource (processor) has only outgong edge(s) to processor(s) (resource(s)). A path s a sequence of edges p 1 q 1 q 1 p 2 pk q k1 q s ps 1 {(, ),(, ),...,(, ),(, ) where E. If a path starts fro and ends at the sae node, then t s a cycle. A cycle does not contan any snk or source nodes. The focus of ths paper s deadlock detecton. For our vrtual achne resource allocaton on heterogeneous dstrbuted platfors deadlock detecton pleentaton, we ake three assuptons. Frst, each resource type has one unt. Thus, a cycle s a suffcent condton for deadlock [3]. Second, satsfes request wll be granted edately, akng the overall syste expedent [3]. Thus, a processor s blocked only f t cannot obtan the requests at the sae te. All proposed algorths, ncludng those based on a RAG, have O(n) n the worst case.. In ths paper, we propose deadlock detecton algorth wth O(n(,n)) based on a new atrx representaton. The proposed vrtual achne resource allocaton on heterogeneous dstrbuted platfors deadlock detecton algorth akes use of s and can handle ultple requests/grants, akng the proposed algorth faster than the O(n) algorth [16], [17]. IV. DEADLOCK DETECTION FOR RESOURCE ALLOCATION IN HETEROGENEOUS DISTRIBUTED PLATFORMS In ths secton, we wll frst ntroduce the atrx representaton of a deadlock detecton proble. The algorth s based on ths atrx representaton. Next, we present soe essental features of the proposed algorth. Ths algorth s, and thus can be apped nto a cloud archtecture whch can handle ultple requests/grants sultaneously and can detect ultple deadlocks n lnear te, hence, sgnfcantly provng perforance. A). Matrx Representaton of a Deadlock Detecton Proble In graph theory, any drected graph can be represented wth an adacency atrx [3]. Thus, we can represent a RAG wth an adacency atrx. However, there are two knds of edges n a RAG: grant edges, whch pont fro resources to processors, and request edges, whch pont fro processors to resources. To dstngush dfferent edges, we desgnate eleents n the adacency atrx wth three dfferent values as shown n Fgure 2. Ths Fgure shows the atrx representaton of a gven syste wth processors p 1, p 2,,p,...,p and resources q 1, q 2,,q,,q n. The leftost colun s the processors label colun. The top row s the resources label row. If there s a request edge (p,q ) n the RAG, correspondng eleent n the atrx s r. If there s a grant edge (q,p ) n the RAG. The correspondng eleent n the atrx s g. Otherwse, the value of the eleent s 0. Ths varant of the adacency atrx of a RAG (V,E) can be defned forally as follows: M [ ] n, (1, 1 n), where s the nuber of processors and n s the nuber of resources. {r,g,0} = r, f f ( p, q ) E = g, f f ( p, q ) E = 0, f otherwse Ths atrx provdes a teplate able to represent request and grant cobnatons. Note that each resource has at ost one grant, that s, there s at ost one g n a colun at any te. However, there s no constrant on the nuber of requests fro each processor. If there are deadlocks n a syste, there ust be at least one cycle n ts RAG, that s, there ust be a sequence of edges, {( p, q ),( q, p ),...,( p, q ),( q, p ),...,( p, q ),( q, p )} k k k k 1 s s s 1 E,where. In the atrx representaton, ths cycle s apped nto a sequence of atrx eleents { 1,,...,,,, } k k k 1 k s s 1 where are s requests(r s) and 2,,...,, k 1 k 1 s are grants (g s). By ths fact, we can detect deadlocks n a syste wth ts adacency atrx. Next, we wll present the new detecton algorth.

4 Ha Huy Cuong Nguyen and Van Son Le 4 B). Deadlock Detecton Algorth On ths bass of the atrx representaton, we propose a deadlock detecton algorth. The basc dea n ths algorth s teratvely reducng the atrx by reovng those coluns or rows correspondng to any of the followng cases: a row or colun of all 0 s; a source ( a row wth one or ore r s but no g s, or a colun wth one g and no r s); a snk ( a row wth one or ore g s but no r s, or a colun wth one r s but no g s); Ths contnues untl the atrx cannot be reduced any ore. At ths te, f the atrx stll contans row(s) or colun(s) n whch there are non-zero eleents, then there s at least one deadlock. Otherwse, there s no deadlock. The descrpton of ths ethod s shown n algorth. Algorth: Deadlock Detecton Algorth (CPU)* ()* Input: P ; P fro IaaS provder ; Step 1: calculate optal resource allocaton to (CPU) * () * provde VM. x, x Max{ U IaaS }; Step 2: Coputes new resource CPU (CPU) ( ) If C x, C x then CPU ( n1) CPU ( n) ( CPU ) CPU r ax{, r n( x C )}; ( n1) ( n) () r ax{, r n( x C )}; CPU ( n 1) ( n1) Return new resource r ; r Else Step 3: Intalzaton n M [ ], Where {r,g,0}, ( =1,, and =1,,n) = r f (p,q ) E. = g f (p,q ) E. = 0, otherwse. { M, 0}; Step 4: Reove all snk and sources DO { Reducble = 0; For each colun: f ( k, k, k {, 0}){ colun { 1, 2, 3,..., }, reducble 1; } else{} For each row: f ( k, k, k {, 0}){ row { 1, 2, 3,..., }, reducble 1; } else{} colun row; } UNTIL( reducble 0); Step 5: Detect Deadlock If ( 0 ), then return deadlock exts. If ( 0 ), then return no deadlock exts. CPU (n 1) (n1) Output: new resource r ; r The followng exaple llustrates how the algorth works, n each teraton of ths algorth; at least one reducton can be perfored f the atrx s reducble. Hence, t takes at ost n(,n) teratons to coplete the deadlock C). Our Algorth to Avodance Deadlock In heterogeneous dstrbuted platfors f there are n processes for each processor and resources the algorth wll be as follow: Step 1: In any of the processes of a processor usng one of the resources n a specfc te perod (.e., the perod-1) then no other requreents for the resources wll be allocated for the specfed te perod. Step 2: The resource occuped can be used by other processes wthn a specfc te perod (.e., the perod-2) only after the release by the process of step 1 by approxately te-1. Durng the perod-2 has no other process wll be able to use that resource. Step 3: In the sae way, a process of the processor s deterned n step 2 can use an O resources n a specfc te perod (.e., the perod-3) n the absence the other wll be able to use that resource. Step 4: The resources that were occuped n step 3 can be used by other processes defned n step 1 n a specfc te perod (.e., the perod-4) only after released by the process of step 3 by approxately-3. Durng the perod-4 has no other process wll be able to use that resource. D). Proof of the Correctness of DDA Exaple 2 State atrx representaton The syste n state shown n Fg. 2 (a) can be representaton n the atrx for show n (b). For the sake of better understandng, we wll descrbe t n the atrx representaton, shown n Fg. 3 (c) fro now on.

5 Internatonal Journal of Coputer Scence and Telecouncatons [Volue 6, Issue 2, February 2015] 5 p3 q2 p1 q1 p4 q3 p2 q4 p5 p6 q5 q6 rg0r00 00rg00 => M = 0000g0 000rgr 0000rg 00000r The frst case generated the request usng a noral dstrbuton of arrval te. Ths deternes the perforance of the algorths to handle the arrval of tasks n an exponentally ncreasng nuber of request. There were up 100 request generated and also these requests were assgned n randoly. => Fg. 2. Matrx representaton exaple Fg. 4. Message overheads by network latences usng the generated requests based on arrval te n noral dstrbuton Step 1 (a) The coparatve analyss of experental result can be seen n any tes, after task executon, although there were ndvdual te proved DDA algorth response te was not sgnfcantly less than optal te algorth, n ost cases, proved algorth s better than the optal te algorth, thus valdated the correctness and effectveness. VI. CONCLUSION Step 2 (b) Step 3 (c) Fg. 3. A saple sequence of reducton steps and deadlock detecton V. SIMULATION RESULTS AND ANALYSIS In ths paper, resource allocaton ethod based on proved DDA has been valdated on CloudS, the platfor s an open source platfor, we used Java language to progra algorth pleentaton class. Experents gve n tasks, by CloudS s own optzaton ethod and proved algorth. Deadlock s a hghly unfavorable stuaton that can occur n any ultprocessor syste. The occurrence of a deadlock can crpple parts of a ultprocessor syste. It s necessary to develop control polces that avod deadlocks by restrctng the freedo n resource allocaton. In ths paper we have presented a fast deadlock detecton and deadlock avodance ethodology that s easly applcable to heterogeneous dstrbuted platfors. Once a deadlock s detected, t ust be soehow resolved. In a heterogeneous dstrbuted platfors large proble s dstrbute aong the processors (such as aong the coputers of dstrbuted coputng syste or aong the coputers of parallel coputng syste etc.) to ake t cost effectve and less te consung nstead of a coputer syste wth sngle processor. But snce the large progra s dvded nto saller progras chances of occurrng deadlock becoes hgh. So, t s very necessary to apply deadlock avodance ethod n ultprocessor syste. In ths paper we have also provded the algorth whch sple and easy to understand. We can also pleent ths ethod everywhere n our coputatonal lfe as needed. REFERENCES [1]. Ha Huy Cuong Nguyen, Van Son Le, Thanh Thuy Nguyen, Algorthc approach to deadlock detecton for resource allocaton n heterogeneous platfors, Proceedngs of 2014 Internatonal Conference on Sart Coputng 3-5 Noveber, Hong Kong, Chna, pp

6 Ha Huy Cuong Nguyen and Van Son Le 6 [2]. Arbrust, M., Fox, A., Grffth, R., Joseph, A., Katz, R., Konwnsk, A., Lee, G., Patterson, D.,Rabkn, A., Stoca, I., Zahara, M.: A vew of cloud coputng. Coun. ACM53(4), (2010) [3]. M. Andreoln, S. Casolar, M. Colaann, and M. Messor, Dynac load anageent of vrtual achnes n cloud archtectures, n CLOUDCOMP, [4]. P. Shu, Y. Tan and V. Mooney "A novel deadlock detecton algorth and archtecture", Proc. CODES 01, pp.73-78, (2001). [5]. Vaquero, L.M., Rodero-Merno, L., Caceres, J., Lndner, M.: A break n the clouds: towards a cloud defnton. SIGCOMM Coput. Coun. Rev. 39(1), (2009) [6]. Arbrust, M., Fox, A., Grffth, R., Joseph, A.D., Katz, R., Konwnsk, A., Lee, G., Patterson, D.,Rabkn, A., Stoca, I., Zahara, M.: Above the Clouds: A Berkeley Vew of Cloud Coputng.Techncal Report No. UCB EECS , Unversty of Calforna at Berkley, USA, Feb 10, 2009 [7]. Kaur P.D., Chana I.: Enhancng Grd Resource Schedulng Algorths for Cloud Envronents. HPAGC 2011, pp , (2011) [8]. Vouk, M.A.: Cloud coputng: Issues, research and pleentatons. In: Inforaton Technology Interfaces. ITI th Internatonal Conference on, 2008, pp , (2008) [9]. Srkantaah, S., Kansal, A., Zhao, F.: Energy aware consoldaton for cloud coputng. Cluster Coput. 12, 1 15 (2009) [10]. Berl, A., Gelenbe, E., d Grolao, M., Gulan, G., de Meer, H., Pentkouss, K., Dang, M.Q.:Energy-effcent cloud coputng. Coput. J. 53(7), (2010) [11]. Garg, S.K., Yeo, C.S., Anandasva, A., Buyya, R.: Envronent-conscous schedulng of HPC applcatons on dstrbuted cloud-orented data centers. J Dstrb Coput. Elsever Press,Asterda, (2011) [12]. Warneke, D., Kao, O.: Explotng dynac resource allocaton for effcent data processng n the cloud. IEEE Trans. Dstrb. Syst. 22(6), (2011). [13]. Wu, L., Garg, S.K., Buyya, R.: SLA-based Resource Allocaton for a Software as a Servce Provder n Cloud Coputng Envronents. In: Proceedngs of the 11th IEEE/ACM Internatonal Syposu on Cluster Coputng and the Grd (CCGrd 2011), Los Angeles, USA, May 23 26, (2011). [14]. Adds, B., Ardagna, D., Pancucc, B.: Autonoc Manageent of Cloud Servce Centers wth Avalablty Guarantees IEEE 3rd Internatonal Conference on Cloud Coputng, pp , (2010). [15]. Abdelsala, H.S., Maly, K., Kansky, D.: Analyss of Energy Effcency n Clouds Co-putaton World: Future Coputng, Servce Coputaton, Cogntve, Adaptve, Content, Patterns, pp , (2009). [16]. Yazr, Y.O., Matthews, C., Farahbod, R.: Dynac Resource Allocaton n Coputng Clouds usng Dstrbuted Multple Crtera Decson Analyss. IEEE 3rd Internatonal Conference on Cloud Coputng, pp , (2010). [17]. M. Stllwell, D. Schanzenbach, F. Vven, and H. Casanova, Resource allocaton algorths for vrtualzed servce hostng platfors, JPDC, vol. 70, no. 9, pp , (2010). [18]. S. Banen, A. I. Bucur, and D. H. Epea, A easureentbased sulaton study of processor co-allocaton n ultcluster systes, n JSSPP, pp , (2003). [19]. A. Buttar, J. Kurzak, and J. Dongarra, Ltatons of the PlayStaton 3 for hgh perforance cluster coputng, U Tenn., Knoxvlle ICL, Tech. Rep. UT-CS , (2007). [20]. D. P. Mtchell and M. J. Merrtt, A dstrbuted algorth for deadlock detecton and resoluton, n Proc.ACM Syposu on Prncples of Dstrbuted Coputng, pp ,1984. [21]. A.D.Kshekalyan, and M.Snghal. (1999), A One-Phase Algorth to Detect Dstrbuted Deadlocks n Replcated Databases, IEEE Trans. Knowledge and Data Eng., vol. 11, No. 6, pp [22]. RakuarBuyya, Chee Shn Yeo, and Srkuar Venugopal, Market-Orented Cloud Coputng: Vson, Hype, and Realty for Delverng IT Servces as Coputng Utltes, Internatonal Conference on Hgh Perforance Coputng, [23]. Bondy JA, Murty USR (2008) Graph theory. Sprnger graduate texts n atheatcs. Sprnger, Berln. ISBN [24]. Fourner JC (2009) Graph theory and applcatons. Wley, New York. ISBN [25]. Greg N. Frederckson, Fast algorths for shortest paths n planar graphs, wth applcatons, SIAM Journal on Coputng, v.16 n.6, p

On-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System

On-line Scheduling Algorithm with Precedence Constraint in Embeded Real-time System 00 rd Internatonal Conference on Coputer and Electrcal Engneerng (ICCEE 00 IPCSIT vol (0 (0 IACSIT Press, Sngapore DOI: 077/IPCSIT0VNo80 On-lne Schedulng Algorth wth Precedence Constrant n Ebeded Real-te

More information

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time Lesle Laports e, locks & the Orderng of Events n a Dstrbuted Syste Joseph Sprng Departent of oputer Scence Dstrbuted Systes and Securty Overvew Introducton he artal Orderng Logcal locks Orderng the Events

More information

An Efficient Fault-Tolerant Multi-Bus Data Scheduling Algorithm Based on Replication and Deallocation

An Efficient Fault-Tolerant Multi-Bus Data Scheduling Algorithm Based on Replication and Deallocation BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 16, No Sofa 016 Prnt ISSN: 1311-970; Onlne ISSN: 1314-4081 DOI: 10.1515/cat-016-001 An Effcent Fault-Tolerant Mult-Bus Data

More information

A New Technical Solution Prevention Deadlock for Resource Allocation in Heterogeneous Distributed Platforms

A New Technical Solution Prevention Deadlock for Resource Allocation in Heterogeneous Distributed Platforms A New Technical Solution Prevention Deadlock for Resource Allocation in Heterogeneous Distributed Platforms 266 1 Nguyen Ha Huy Cuong, 2 Dang Hung Vi, 2 Le Van Son, 3 Nguyen Thanh Thuy 1 Department of

More information

Generating Fuzzy Term Sets for Software Project Attributes using and Real Coded Genetic Algorithms

Generating Fuzzy Term Sets for Software Project Attributes using and Real Coded Genetic Algorithms Generatng Fuzzy Ter Sets for Software Proect Attrbutes usng Fuzzy C-Means C and Real Coded Genetc Algorths Al Idr, Ph.D., ENSIAS, Rabat Alan Abran, Ph.D., ETS, Montreal Azeddne Zah, FST, Fes Internatonal

More information

Multi-Constraint Multi-Processor Resource Allocation

Multi-Constraint Multi-Processor Resource Allocation Mult-Constrant Mult-Processor Resource Allocaton Ar R. B. Behrouzan 1, Dp Goswa 1, Twan Basten 1,2, Marc Gelen 1, Had Alzadeh Ara 1 1 Endhoven Unversty of Technology, Endhoven, The Netherlands 2 TNO Ebedded

More information

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming

Optimization Methods: Integer Programming Integer Linear Programming 1. Module 7 Lecture Notes 1. Integer Linear Programming Optzaton Methods: Integer Prograng Integer Lnear Prograng Module Lecture Notes Integer Lnear Prograng Introducton In all the prevous lectures n lnear prograng dscussed so far, the desgn varables consdered

More information

Scheduling Workflow Applications on the Heterogeneous Cloud Resources

Scheduling Workflow Applications on the Heterogeneous Cloud Resources Indan Journal of Scence and Technology, Vol 8(2, DOI: 0.7485/jst/205/v82/57984, June 205 ISSN (rnt : 0974-6846 ISSN (Onlne : 0974-5645 Schedulng Workflow Applcatons on the Heterogeneous Cloud Resources

More information

AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS

AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS Internatonal ournal on applcatons of graph theory n wreless ad hoc networks and sensor networks (GRAPH-HOC) Vol.3, No., March 0 AN ALGORITHM FOR ODD GRACEFULNESS OF THE TENSOR PRODUCT OF TWO LINE GRAPHS

More information

Multiple Instance Learning via Multiple Kernel Learning *

Multiple Instance Learning via Multiple Kernel Learning * The Nnth nternatonal Syposu on Operatons Research and ts Applcatons (SORA 10) Chengdu-Juzhagou, Chna, August 19 23, 2010 Copyrght 2010 ORSC & APORC, pp. 160 167 ultple nstance Learnng va ultple Kernel

More information

Solutions to Programming Assignment Five Interpolation and Numerical Differentiation

Solutions to Programming Assignment Five Interpolation and Numerical Differentiation College of Engneerng and Coputer Scence Mechancal Engneerng Departent Mechancal Engneerng 309 Nuercal Analyss of Engneerng Systes Sprng 04 Nuber: 537 Instructor: Larry Caretto Solutons to Prograng Assgnent

More information

User Behavior Recognition based on Clustering for the Smart Home

User Behavior Recognition based on Clustering for the Smart Home 3rd WSEAS Internatonal Conference on REMOTE SENSING, Vence, Italy, Noveber 2-23, 2007 52 User Behavor Recognton based on Clusterng for the Sart Hoe WOOYONG CHUNG, JAEHUN LEE, SUKHYUN YUN, SOOHAN KIM* AND

More information

STATIC MAPPING FOR OPENCL WORKLOADS IN HETEROGENEOUS COMPUTER SYSTEMS

STATIC MAPPING FOR OPENCL WORKLOADS IN HETEROGENEOUS COMPUTER SYSTEMS STATIC MAPPING FOR OPENCL WORKLOADS IN HETEROGENEOUS COMPUTER SYSTEMS 1 HENDRA RAHMAWAN, 2 KUSPRIYANTO, 3 YUDI SATRIA GONDOKARYONO School of Electrcal Engneerng and Inforatcs, Insttut Teknolog Bandung,

More information

ALM-FastReplica: Optimizing the Reliable Distribution of Large Files within CDNs

ALM-FastReplica: Optimizing the Reliable Distribution of Large Files within CDNs ALM-FastReplca: Optzng the Relable Dstrbuton of Large Fles wthn CDNs Ludla Cherkasova Internet Systes and Storage Laboratory HP Laboratores Palo Alto HPL-005-64 Aprl 4, 005* E-al: cherkasova@hpl.hp.co

More information

A Unified Approach to Survivability of Connection-Oriented Networks

A Unified Approach to Survivability of Connection-Oriented Networks A Unfed Approach to Survvablty of Connecton-Orented Networs Krzysztof Walowa Char of Systes and Coputer Networs, Faculty of Electroncs, Wroclaw Unversty of Technology, Wybrzeze Wyspansego 27, 50-370 Wroclaw,

More information

APPROACH TO USING TWO WAY SEARCH DEADLOCK DETECTION FOR RESOURCE ALLOCATION IN HETEROGENEOUS DISTRIBUTED PLATFORMS

APPROACH TO USING TWO WAY SEARCH DEADLOCK DETECTION FOR RESOURCE ALLOCATION IN HETEROGENEOUS DISTRIBUTED PLATFORMS International Journal of Computer & Communication Engineering Research (IJCCER) Volume 3 - Issue 1 January 2015 APPROACH TO USING TWO WAY SEARCH DEADLOCK DETECTION FOR RESOURCE ALLOCATION IN HETEROGENEOUS

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Journal of Engineering Science and Technology Review 10 (5) (2017) Research Article

Journal of Engineering Science and Technology Review 10 (5) (2017) Research Article Jestr Journal of Engneerng Scence and Technology Revew 0 (5) (07) 4-49 Research Artcle Study on Fault Tolerance Method n Cloud Platfor based on Worload Consoldaton Model of Vrtual Machne Zhxn L,,*, Le

More information

What is Object Detection? Face Detection using AdaBoost. Detection as Classification. Principle of Boosting (Schapire 90)

What is Object Detection? Face Detection using AdaBoost. Detection as Classification. Principle of Boosting (Schapire 90) CIS 5543 Coputer Vson Object Detecton What s Object Detecton? Locate an object n an nput age Habn Lng Extensons Vola & Jones, 2004 Dalal & Trggs, 2005 one or ultple objects Object segentaton Object detecton

More information

A system based on a modified version of the FCM algorithm for profiling Web users from access log

A system based on a modified version of the FCM algorithm for profiling Web users from access log A syste based on a odfed verson of the FCM algorth for proflng Web users fro access log Paolo Corsn, Laura De Dosso, Beatrce Lazzern, Francesco Marcellon Dpartento d Ingegnera dell Inforazone va Dotsalv,

More information

Large Margin Nearest Neighbor Classifiers

Large Margin Nearest Neighbor Classifiers Large Margn earest eghbor Classfers Sergo Bereo and Joan Cabestany Departent of Electronc Engneerng, Unverstat Poltècnca de Catalunya (UPC, Gran Captà s/n, C4 buldng, 08034 Barcelona, Span e-al: sbereo@eel.upc.es

More information

Multicast Tree Rearrangement to Recover Node Failures. in Overlay Multicast Networks

Multicast Tree Rearrangement to Recover Node Failures. in Overlay Multicast Networks Multcast Tree Rearrangeent to Recover Node Falures n Overlay Multcast Networks Hee K. Cho and Chae Y. Lee Dept. of Industral Engneerng, KAIST, 373-1 Kusung Dong, Taejon, Korea Abstract Overlay ultcast

More information

A New Scheduling Algorithm for Servers

A New Scheduling Algorithm for Servers A New Schedulng Algorth for Servers Nann Yao, Wenbn Yao, Shaobn Ca, and Jun N College of Coputer Scence and Technology, Harbn Engneerng Unversty, Harbn, Chna {yaonann, yaowenbn, cashaobn, nun}@hrbeu.edu.cn

More information

EXTENDED FORMAL SPECIFICATIONS OF 3D SPATIAL DATA TYPES

EXTENDED FORMAL SPECIFICATIONS OF 3D SPATIAL DATA TYPES - 1 - EXTENDED FORMAL SPECIFICATIONS OF D SPATIAL DATA TYPES - TECHNICAL REPORT - André Borrann Coputaton Cvl Engneerng Technsche Unverstät München INTRODUCTION Startng pont for the developent of a spatal

More information

Measuring Cohesion of Packages in Ada95

Measuring Cohesion of Packages in Ada95 Measurng Coheson of Packages n Ada95 Baowen Xu Zhenqang Chen Departent of Coputer Scence & Departent of Coputer Scence & Engneerng, Southeast Unversty Engneerng, Southeast Unversty Nanjng, Chna, 20096

More information

Heuristic Methods for Locating Emergency Facilities

Heuristic Methods for Locating Emergency Facilities Heurstc Methods for Locatng Eergency Facltes L. Caccetta and M. Dzator Western Australan Centre of Excellence n Industral Optsaton, Curtn Unversty of Technology, Kent Street, Bentley WA 602, Australa E-Mal:

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

2016 International Conference on Sustainable Energy, Environment and Information Engineering (SEEIE 2016) ISBN:

2016 International Conference on Sustainable Energy, Environment and Information Engineering (SEEIE 2016) ISBN: 06 Internatonal Conference on Sustanable Energy, Envronent and Inforaton Engneerng (SEEIE 06) ISBN: 978--60595-337-3 A Study on IEEE 80. MAC Layer Msbehavor under Dfferent Back-off Algorths Trong Mnh HOANG,,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Estimating Progress of Execution for SQL Queries

Estimating Progress of Execution for SQL Queries Estatng Progress of Executon for SQL Queres Surajt Chaudhur Vvek arasayya Ravshankar Raaurthy Mcrosoft Research Mcrosoft Research Unversty of Wsconsn, Madson surajtc@crosoft.co vveknar@crosoft.co rav@cs.wsc.edu

More information

Color Image Segmentation Based on Adaptive Local Thresholds

Color Image Segmentation Based on Adaptive Local Thresholds Color Iage Segentaton Based on Adaptve Local Thresholds ETY NAVON, OFE MILLE *, AMI AVEBUCH School of Coputer Scence Tel-Avv Unversty, Tel-Avv, 69978, Israel E-Mal * : llero@post.tau.ac.l Fax nuber: 97-3-916084

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

An Adaptive Sleep Strategy for Energy Conservation in Wireless Sensor Networks

An Adaptive Sleep Strategy for Energy Conservation in Wireless Sensor Networks An Adaptve Sleep Strategy for Energy Conservaton n Wreless Sensor Networks Guseppe Anastas, Marco Cont, Maro D Francesco Abstract - In recent years, wreless sensor network deployents for real lfe applcatons

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

Routing Time-Constrained Traffic in Wireless Sensor Networks

Routing Time-Constrained Traffic in Wireless Sensor Networks Routng Te-Constraned Traffc n Wreless Sensor Networks Keal Akkaya and Mohaed Youns Departent of Coputer Scence and Electrcal Engneerng Unversty of Maryland, Baltore County Baltore, MD 2250 keal youns@cs.ubc.edu

More information

Merging Results by Using Predicted Retrieval Effectiveness

Merging Results by Using Predicted Retrieval Effectiveness Mergng Results by Usng Predcted Retreval Effectveness Introducton Wen-Cheng Ln and Hsn-Hs Chen Departent of Coputer Scence and Inforaton Engneerng Natonal Tawan Unversty Tape, TAIWAN densln@nlg.cse.ntu.edu.tw;

More information

A new Fuzzy Noise-rejection Data Partitioning Algorithm with Revised Mahalanobis Distance

A new Fuzzy Noise-rejection Data Partitioning Algorithm with Revised Mahalanobis Distance A new Fuzzy ose-reecton Data Parttonng Algorth wth Revsed Mahalanobs Dstance M.H. Fazel Zarand, Mlad Avazbeg I.B. Tursen Departent of Industral Engneerng, Arabr Unversty of Technology Tehran, Iran Departent

More information

Pose Invariant Face Recognition using Hybrid DWT-DCT Frequency Features with Support Vector Machines

Pose Invariant Face Recognition using Hybrid DWT-DCT Frequency Features with Support Vector Machines Proceedngs of the 4 th Internatonal Conference on 7 th 9 th Noveber 008 Inforaton Technology and Multeda at UNITEN (ICIMU 008), Malaysa Pose Invarant Face Recognton usng Hybrd DWT-DCT Frequency Features

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Predicting Power Grid Component Outage In Response to Extreme Events. S. BAHRAMIRAD ComEd USA

Predicting Power Grid Component Outage In Response to Extreme Events. S. BAHRAMIRAD ComEd USA 1, rue d Artos, F-75008 PARIS CIGRE US Natonal Cottee http : //www.cgre.org 016 Grd of the Future Syposu Predctng Power Grd Coponent Outage In Response to Extree Events R. ESKANDARPOUR, A. KHODAEI Unversty

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Research on action recognition method under mobile phone visual sensor Wang Wenbin 1, Chen Ketang 2, Chen Liangliang 3

Research on action recognition method under mobile phone visual sensor Wang Wenbin 1, Chen Ketang 2, Chen Liangliang 3 Internatonal Conference on Autoaton, Mechancal Control and Coputatonal Engneerng (AMCCE 05) Research on acton recognton ethod under oble phone vsual sensor Wang Wenbn, Chen Ketang, Chen Langlang 3 Qongzhou

More information

Realistic 3D Face Modeling by Fusing Multiple 2D Images

Realistic 3D Face Modeling by Fusing Multiple 2D Images Realstc 3D Face Modelng by Fusng Multple D ages Changhu Wang EES Departent, Unversty of Scence and echnology of Chna, wch@ustc.edu Shucheng Yan, Hongjang Zhang, Weyng Ma Mcrosoft Research Asa, Bejng,.R.

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Using Gini-Index for Feature Selection in Text Categorization

Using Gini-Index for Feature Selection in Text Categorization 3rd Internatonal Conference on Inforaton, Busness and Educaton Technology (ICIBET 014) Usng Gn-Index for Feature Selecton n Text Categorzaton Zhu Wedong 1, Feng Jngyu 1 and Ln Yongn 1 School of Coputer

More information

Handover Delay Estimation Method for IMS-Based Systems with Heterogeneous Access Networks

Handover Delay Estimation Method for IMS-Based Systems with Heterogeneous Access Networks Councatons 07; (): -7 http://www.scencepublshnggroup.co/j/co do: 0.8/j.co.0700. ISSN: 8-9 (Prnt); ISSN: 8-9 (Onlne) Handover Delay Estaton Method for IMS-Based Systes wth Heterogeneous Access Networks

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Multi-Tier Diversified Service Architecture for Internet 3.0: The Next Generation Internet

Multi-Tier Diversified Service Architecture for Internet 3.0: The Next Generation Internet Washngton Unversty n St. Lous Washngton Unversty Open Scholarshp All Coputer Scence and Engneerng Research Coputer Scence and Engneerng Report Nuber: WUCSE-2010-31 2010 Mult-Ter Dversfed Servce Archtecture

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

A Theory of Non-Deterministic Networks

A Theory of Non-Deterministic Networks A Theory of Non-Deternstc Networs Alan Mshcheno and Robert K rayton Departent of EECS, Unversty of Calforna at ereley {alan, brayton}@eecsbereleyedu Abstract oth non-deterns and ult-level networs copactly

More information

Handwritten English Character Recognition Using Logistic Regression and Neural Network

Handwritten English Character Recognition Using Logistic Regression and Neural Network Handwrtten Englsh Character Recognton Usng Logstc Regresson and Neural Network Tapan Kuar Hazra 1, Rajdeep Sarkar 2, Ankt Kuar 3 1 Departent of Inforaton Technology, Insttute of Engneerng and Manageent,

More information

Energy-aware Delay-Constrained Routing in Wireless Sensor Networks

Energy-aware Delay-Constrained Routing in Wireless Sensor Networks Energy-aware Delay-Constraned Routng n Wreless Sensor Networks Keal Akkaya and Mohaed Youns Departent of Coputer Scence and Electrcal Engneerng Unversty of Maryland Baltore County, Baltore, MD 21250 {keal1,

More information

Monte Carlo inference

Monte Carlo inference CS 3750 achne Learnng Lecture 0 onte Carlo nerence los Hauskrecht los@cs.ptt.edu 539 Sennott Square Iportance Saplng an approach or estatng the epectaton o a uncton relatve to soe dstrbuton target dstrbuton

More information

Pattern Classification of Back-Propagation Algorithm Using Exclusive Connecting Network

Pattern Classification of Back-Propagation Algorithm Using Exclusive Connecting Network World Acade of Scence, Engneerng and Technolog 36 7 Pattern Classfcaton of Bac-Propagaton Algorth Usng Eclusve Connectng Networ Insung Jung, and G-Na Wang Abstract The obectve of ths paper s to a desgn

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

Building intelligent logistics system based on internet of things RFID in platform of cloud computing

Building intelligent logistics system based on internet of things RFID in platform of cloud computing Avalable onlne www.jocpr.co Journal of Checal and Pharaceutcal Research, 014, 6(6):77-778 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 Buldng ntellgent logstcs syste based on nternet of thngs RFID

More information

On Total Vertex Irregularity Strength of Triangle Related Graphs

On Total Vertex Irregularity Strength of Triangle Related Graphs Annals o Pure and Appled Matheatcs Vol., No., 0, 08-6 ISSN: 79-087X (P), 79-0888(onlne) Publshed on 0 October 0 www.researchathsc.org Annals o On Total Vertex Irregularty Strength o Trangle Related Graphs

More information

Maintaining temporal validity of real-time data on non-continuously executing resources

Maintaining temporal validity of real-time data on non-continuously executing resources Mantanng temporal valdty of real-tme data on non-contnuously executng resources Tan Ba, Hong Lu and Juan Yang Hunan Insttute of Scence and Technology, College of Computer Scence, 44, Yueyang, Chna Wuhan

More information

126 Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, No. 3, Djamel Djenouri*

126 Int. J. Ad Hoc and Ubiquitous Computing, Vol. 1, No. 3, Djamel Djenouri* 126 Int. J. Ad Hoc and Ubqutous Coputng, Vol. 1, No. 3, 2006 New power-aware routng protocol for oble ad hoc networks Djael Djenour* Basc Software Laboratory, CERIST Center of Research, Algers, Algera

More information

On Some Entertaining Applications of the Concept of Set in Computer Science Course

On Some Entertaining Applications of the Concept of Set in Computer Science Course On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments

Comparison of Heuristics for Scheduling Independent Tasks on Heterogeneous Distributed Environments Comparson of Heurstcs for Schedulng Independent Tasks on Heterogeneous Dstrbuted Envronments Hesam Izakan¹, Ath Abraham², Senor Member, IEEE, Václav Snášel³ ¹ Islamc Azad Unversty, Ramsar Branch, Ramsar,

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Aircraft Engine Gas Path Fault Diagnosis Based on Fuzzy Inference

Aircraft Engine Gas Path Fault Diagnosis Based on Fuzzy Inference 202 Internatonal Conference on Industral and Intellgent Inforaton (ICIII 202) IPCSIT vol.3 (202) (202) IACSIT Press, Sngapore Arcraft Engne Gas Path Fault Dagnoss Based on Fuzzy Inference Changzheng L,

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

AP PHYSICS B 2008 SCORING GUIDELINES

AP PHYSICS B 2008 SCORING GUIDELINES AP PHYSICS B 2008 SCORING GUIDELINES General Notes About 2008 AP Physcs Scorng Gudelnes 1. The solutons contan the most common method of solvng the free-response questons and the allocaton of ponts for

More information

Nighttime Motion Vehicle Detection Based on MILBoost

Nighttime Motion Vehicle Detection Based on MILBoost Sensors & Transducers 204 by IFSA Publshng, S L http://wwwsensorsportalco Nghtte Moton Vehcle Detecton Based on MILBoost Zhu Shao-Png,, 2 Fan Xao-Png Departent of Inforaton Manageent, Hunan Unversty of

More information

Querying by sketch geographical databases. Yu Han 1, a *

Querying by sketch geographical databases. Yu Han 1, a * 4th Internatonal Conference on Sensors, Measurement and Intellgent Materals (ICSMIM 2015) Queryng by sketch geographcal databases Yu Han 1, a * 1 Department of Basc Courses, Shenyang Insttute of Artllery,

More information

Key-Words: - Under sear Hydrothermal vent image; grey; blue chroma; OTSU; FCM

Key-Words: - Under sear Hydrothermal vent image; grey; blue chroma; OTSU; FCM A Fast and Effectve Segentaton Algorth for Undersea Hydrotheral Vent Iage FUYUAN PENG 1 QIAN XIA 1 GUOHUA XU 2 XI YU 1 LIN LUO 1 Electronc Inforaton Engneerng Departent of Huazhong Unversty of Scence and

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

The Shortest Path of Touring Lines given in the Plane

The Shortest Path of Touring Lines given in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 262 The Open Cybernetcs & Systemcs Journal, 2015, 9, 262-267 The Shortest Path of Tourng Lnes gven n the Plane Open Access Ljuan Wang 1,2, Dandan He

More information

A NEW APPROACH FOR SOLVING LINEAR FUZZY FRACTIONAL TRANSPORTATION PROBLEM

A NEW APPROACH FOR SOLVING LINEAR FUZZY FRACTIONAL TRANSPORTATION PROBLEM Internatonal Journal of Cvl Engneerng and Technology (IJCIET) Volue 8, Issue 8, August 217, pp. 1123 1129, Artcle ID: IJCIET_8_8_12 Avalable onlne at http://http://www.aee.co/cet/ssues.asp?jtype=ijciet&vtype=8&itype=8

More information

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton

More information

Modeling and Assessment Performance of OpenFlow-Based Network Control Plane

Modeling and Assessment Performance of OpenFlow-Based Network Control Plane Modelng and Assessent Perforance of OpenFlo-Based Netork Control Plane Saer Salah Al_Yassn Assstant Teacher, Al_Maon Unversty College Abstract: The subject of the paper s the features of netork archtecture

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Optimizing Efficiency of Taxi Systems: Scaling-up and Handling Arbitrary Constraints

Optimizing Efficiency of Taxi Systems: Scaling-up and Handling Arbitrary Constraints Optzng Effcency of Tax Systes: Scalng-up and Handlng Arbtrary Constrants ABSTRACT Jaru Gan Unversty of Chnese Acadey of Scences The Key Laboratory of Intellgent Inforaton Processng, ICT, CAS, Bejng 119,

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Application of VCG in Replica Placement Strategy of Cloud Storage

Application of VCG in Replica Placement Strategy of Cloud Storage Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng

More information

Load Balancing Algorithm for Web Server Based on Weighted Minimal Connections

Load Balancing Algorithm for Web Server Based on Weighted Minimal Connections Journal of Web ystes and Applcatons (2017) Vol. 1, Nuuber 1 Clausus centfc Press, Canada Load Balancng Algorth for Web erver Based on Weghted Mnal Connectons Pan Zhu1, a, Jangxng Zhang 2,b College of Inforaton

More information

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1 A Resources Vrtualzaton Approach Supportng Unform Access to Heterogeneous Grd Resources 1 Cunhao Fang 1, Yaoxue Zhang 2, Song Cao 3 1 Tsnghua Natonal Labatory of Inforamaton Scence and Technology 2 Department

More information

A Novel Fuzzy Classifier Using Fuzzy LVQ to Recognize Online Persian Handwriting

A Novel Fuzzy Classifier Using Fuzzy LVQ to Recognize Online Persian Handwriting A Novel Fuzzy Classfer Usng Fuzzy LVQ to Recognze Onlne Persan Handwrtng M. Soleyan Baghshah S. Bagher Shourak S. Kasae Departent of Coputer Engneerng, Sharf Unversty of Technology, Tehran, Iran soleyan@ce.sharf.edu

More information

Two-Stage Data Distribution for Distributed Surveillance Video Processing with Hybrid Storage Architecture

Two-Stage Data Distribution for Distributed Surveillance Video Processing with Hybrid Storage Architecture Two-Stage Data Dstrbuton for Dstrbuted Survellance Vdeo Processng wth Hybrd Storage Archtecture Yangyang Gao, Hatao Zhang, Bngchang Tang, Yanpe Zhu, Huadong Ma Bejng Key Lab of Intellgent Telecomm. Software

More information

A Novel System for Document Classification Using Genetic Programming

A Novel System for Document Classification Using Genetic Programming Journal of Advances n Inforaton Technology Vol. 6, No. 4, Noveber 2015 A Novel Syste for Docuent Classfcaton Usng Genetc Prograng Saad M. Darwsh, Adel A. EL-Zoghab, and Doaa B. Ebad Insttute of Graduate

More information

Outline. Third Programming Project Two-Dimensional Arrays. Files You Can Download. Exercise 8 Linear Regression. General Regression

Outline. Third Programming Project Two-Dimensional Arrays. Files You Can Download. Exercise 8 Linear Regression. General Regression Project 3 Two-densonal arras Ma 9, 6 Thrd Prograng Project Two-Densonal Arras Larr Caretto Coputer Scence 6 Coputng n Engneerng and Scence Ma 9, 6 Outlne Quz three on Thursda for full lab perod See saple

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

A Semantic Model for Video Based Face Recognition

A Semantic Model for Video Based Face Recognition Proceedng of the IEEE Internatonal Conference on Inforaton and Autoaton Ynchuan, Chna, August 2013 A Seantc Model for Vdeo Based Face Recognton Dhong Gong, Ka Zhu, Zhfeng L, and Yu Qao Shenzhen Key Lab

More information

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)

More information

A fair buffer allocation scheme

A fair buffer allocation scheme A far buffer allocaton scheme Juha Henanen and Kalev Klkk Telecom Fnland P.O. Box 228, SF-330 Tampere, Fnland E-mal: juha.henanen@tele.f Abstract An approprate servce for data traffc n ATM networks requres

More information

AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS

AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS Lngku Meng a, Wenun Xe a, *, Dan Lu a, b a School of Remote Sensng and Informaton Engneerng, Wuhan Unversty, Wuhan 4379,

More information