Selective Flooding Based on Relevant Nearest-Neighbor using Query Feedback and Similarity across Unstructured Peer-to-Peer Networks

Size: px
Start display at page:

Download "Selective Flooding Based on Relevant Nearest-Neighbor using Query Feedback and Similarity across Unstructured Peer-to-Peer Networks"

Transcription

1 Journal of Computer Scence 5 (3): , 009 ISSN Scence Publcatons Selectve Floodng Based on Relevant Nearest-Neghbor usng Query Feedback and Smlarty across Unstructured Peer-to-Peer Networks 1 Iskandar Ishak and Naome Salm 1 Department of Computer Scence, Faculty of Computer Scence and Informaton Technology, Unversty Putra Malaysa, UPM, Selangor, Malaysa Faculty of Computer Scence and Informaton System, Unversty Technology Malaysa, Skuda, Johor, Malaysa Abstract: Problem statement: Effcent searchng s a fundamental problem for unstructured peer to peer networks. Floodng requres a lot of resources n the network and thus wll ncrease the search cost. Searchng approach that utlzes mnmum network resources s requred to produce effcent searchng n the robust and dynamc peer-to-peer network. Approach: Ths study addressed the need for effcent flood-based searchng n unstructured peer-to-peer network by consderng the content of query and only selectng peers that were most related to the query gven. We used mnmum nformaton to perform effcent peer selecton by utlzng the past queres data and the query message. We exploted the nearest-neghbor concept on our query smlarty and query hts space metrcs for selectng the most relevant peers for effcent searchng. Results: As demonstrated by extensve smulatons, our searchng scheme acheved better retreval and low messages consumpton. Concluson: Ths study suggested that, n an unstructured peer-to-peer network, floodng that was based on the selecton of relevant peers, can mprove searchng effcency. Key words: Unstructured peer-to-peer searchng, nformaton retreval, nearest neghbor INTRODUCTION Peer-to-peer system has phenomenally become popular n recent years for ts ablty to search and communcate across the globe. The prncpal operatons n any peer-to-peer networks s to effcently search and locate data or fle, whch s ultmately challengng due to ts dynamc and robust nature. The challenges are to develop searchng effcently able o locate the fle ntended. The dynamc nature of the peer-to-peer network where peers can jon and leave at anytme make the searchng to become effcent s even dffcult. The demand for advance searchng technque s always present as the peer-to-peer networks becomng larger and more complex and the network become faster and storage become cheaper. In a peer-to-peer network, a peer acts as clent and a server of the system. Peer-to-peer presents attractve soluton through ts scalablty, fault-tolerance and autonomy. Many real-world large scale peer-to-peer networks are unstructured. However, n ther basc structure; peer-to-peer suffers hgh cost when dealng wth locatng content effcently due to use of prmtve searchng and routng technque that uses large overhead and long query tme. Therefore t s crucal to select relevant peers to route query message to reduce the search cost and better retreval n unstructured peerto-peer network wthout the loss of the unstructured peer-to-peer dentty and characterstcs. Unstructured peer-to-peer networks such as Gnutella [1,] rely on a random process, that peers are nterconnected n a random way. Typcally, unstructured peer-to-peer search s based on floodng. Basc unstructured networks whch apply floodng technque for propagatng user queres s very expensve both n processng tme and resources. Several studes have addressed the completeness and scalablty ssues of floodng [3,4]. Although flood-based search s generally consdered neffcent, a number of efforts have been done to mprove the searchng n unstructured peer to peer to become more effcent Structured peer-to-peer networks have been developed to provde strct data locaton management [5,6]. It uses dstrbuted hash tables that assst the routng mechansm to mantan desrable propertes for quck lookup. Structured approach offers better search performance n terms of response tme and communcaton overhead when compared to the Correspondng Author: Iskandar Ishak, Department of Computer Scence, Faculty of Computer Scence and Informaton Technology, Unversty Putra Malaysa, Malaysa 184

2 unstructured system. However, despte ts hghly effectve approach, the system lacks partal match lookup capablty. The system also ncur larger overhead than unstructured peer-to-peer systems especally when the overlay s re-arrange whenever there s falng peers or leavng peers. Ths study proposes relevant nearest neghbor based search technque that explots mnmal nformaton n each peer. The algorthm s formulated to acheve effcent search and hgh retreval rate n unstructured peer-to-peer networks. Related work: The earlest technque for peer-to-peer routng s based on the Naïve Breadth-Frst Search (BFS) algorthm or Floodng. Ths technque s used n fle-sharng peer-to-peer applcaton Gnutella [1]. In ths approach, each query from a peer wll be broadcasted to all the peers n the network but restrcted by the TTL (tme to lve) value. Floodng may generate O(N) message where N s the number of node. As a result, the query consumes a great deal of processng resources and excessve network. In a worst case stuaton such as low bandwdth network, floodng could make the network become a bottleneck. Although, t s a robust and smple technque for query routng but t nvolves a great deal of communcaton overhead, that s, hgh n number of messages. Hop count s also ncreased exponentally. Some of the messages mght vst the same node that has been searched prevously. Therefore, communcaton overhead and scalablty are the man problems n ths approach. These problems have been proven n a number of papers [,7,8]. In the random Breadth-Frst-Search (BFS) approach [9,10], each peer forwards a search message to only a fracton of ts peers. Each node randomly selects a subset of peers connected to t and then propagates the search message to those peers. The advantage of ths technque s t does not need any global knowledge. Each peer s able to make local decson n a quck manner snce t needs only small porton of connected peers to route the query. Ths approach may generate only a fracton of messages compared to floodng approach. In random walks [4] approach, the requestng peer sends out a number of query messages to an equal number of random neghborng peers. Each of the query messages wll follow ther own path n whch ntermedate peers wll forward the messages to randomly chosen neghbor. These query messages are known as walkers. The walkers wll be termnated on both success and falure occasons and determned through the use of TTL of the messages or through the use of checkng method n whch the walker perodcally J. Computer Sc., 5 (3): , contact the source peer whether the termnaton condton s met. It acheves sgnfcant message reducton when compared to the floodng approach. However, the success rate and the number of hts depend largely on the network topology and the random choces t made. Another unstructured peer-to-peer searchng approach s the Drected BFS combned wth the Most Result n the Past n [11]. Each peer forwards a search message to a number of peers whch returned the most results for the last most current queres. The nature of ths approach s t allows peers explore larger network segments and fnd most stable neghbors. A content-based searchng for peer-to-peer based system s proposed n [1]. In ths approach, each peer wll have a specal ndex called flters to facltate query routng only to those that may contan relevant nformaton. Each peer mantans one flter that summarzes all documents that exst locally n the peer, called local flters. A merged flters s the flter that summarzng the document of a set of ts neghbors. When a query reaches a peer, the peer wll check ts local flter and uses the merged flter to route the query to the peers whose flters match the query. Intellgent Search Mechansm [9] s proposed as a searchng technque based on the smlarty of the query. In ths approach, each peer has ts own profle table that stores the nformaton they get from peers that answered ther queres. The nformaton stored n Table 1 s the query ID, peer ID and the query keywords that have been answered and also the query ht. Only the latest peer that answered the query wll be kept nto a table. Routng s based on the smlarty values of the query word wth the keyword from the past queres stored n the profle. Peers that have hgh smlarty wth the query wll be selected for routng. Ant Colony optmzaton s also used n unstructured peer-to-peer search n [13]. The approach s called SemAnt where t emulates the nature of ants cooperatng between themselves to fnd food based on the pheromone. The peers are the ones who act lke an ant and cooperated between them n creatng pheromone trals. The pheromone trals s the probablstc overlay networks and also ndcates the most promsng path for a gven query. As a result, the more popular a query becomes, the better the tral. The experments shown that the search algorthm s stable, robust and converges fast whole ts performance s pretty much acceptable. Table 1: Profle table Query ID Connecton and hts Tmestamps Amazon ran forest 1311 P(34), P34(), P5(56) 1011 Gulf ol rgs Null 10 Waste dsposal P4(34), P8(4) 1033

3 J. Computer Sc., 5 (3): , 009 MATERIALS AND METHODS Relevance-Nearest Neghbor based search (RNN) usng query feedback and smlarty: Our search approach consst of 3 components; profle table, relevance peers estmaton and nearest neghbor selecton. Profle table s used to store past query message and query hts from other peers who have answered prevous queres. The Relevance Nearest Neghbor based Search or RNN s based on the concept of gvng the same weght both on the query hts and query content smlarty wth the ncomng query and selectng only the nearest relevant peers. We also nclude the nearest neghbor approach to mnmze the search cost but at the same tme able to retreve hgh query hts or recall. The search method s bascally a floodng based search but s based on selectve floodng. The search algorthm s shown n Fg. 1. The objectve of ths searchng approach s to have an effcent search and hgh recall. For a peer p P, we use T(p) to denote set of past query mantaned by p. Each tem n T(p) has two attrbutes; query term, q and number of hts n, so we denote each data tem n T(p) as a par of q(p), n(p). By usng each q and n on T(p), we determne the relevance of a peer by usng the smlarty of all q(p) n T(p) to calculate the smlarty between them. On the other hand, we use n(p) to calculate the stablty of each peer n T(p). We defne a reference pont, whch s the hghest or optmum value of query smlarty and also the hghest query hts denoted as d pont. Relevance peer estmaton: The relevance-based component s based on the work n [14]. Ths component uses the peer smlarty-hts graph model. Our peer-smlarty graph model captures both the peer query hts and peer smlarty wth correspondng ncomng query (Fg. ). We used both nformaton gathered n the profle table whch s based on the work done n [9]. We ncorporated both, query content and connecton stablty nformaton to determne relevant peer to route query. Each peer stores nformaton about past queres and the query hts n a table. There wll be no global knowledge shared between all the peers but each peer wll also have a lst of data collected from the answered query and store t n neghbor profle table (Table 1). The profle table contans the ID of the answerng peer, connecton ID, the query words that have been answered by other peers and a tmestamp of the returned query. These query words are the words that matched the query sent by ths peer and the words are contaned n the peer are only answered query words. The lst wll keep the last M queres and a Least Recently Used (LRU) polcy wll keep the most recent queres n the table. The relevance value wll be based on two parameters, query hts and the smlarty value between the query to be routed and the stored past queres. Query hts determne peer connecton stablty wth the processng peers. The more query hts, the more stable the peer s connected and thus gvng the mpresson of the partcular peers connecton relablty. Smlarty value s based on cosne smlarty (1). q s the ncomng query whle q s the past queres stored n the profle table n each peer. As an example, let peer A has a lst of past queres; d. Query q s an ncomng query and s watng to be routed q wll be compared wth all the queres, q, n d. The smlarty between them wll determne the relaton between the content that the partcular peer has n ts storage wth the query terms. The most relevance of peers s peers that have among the most query hts and t has a content related to the ncomng query. Fg. 1: Relevance Nearest Neghbor Search algorthm that uses the Selectve floodng concept Fg. : Smlarty and Query hts metrc space 186

4 J. Computer Sc., 5 (3): , 009 Fg. 4: Doublng the normal search radus Fg. 3: Pont of reference estmaton We calculate the relevance value usng formula descrbed n (3). In ths formula, we are actually calculatng the dstance of relevance value of the peers nsde the profle table wth the most optmum relevance pont n the smlarty-query hts graph. M s the maxmum cosne value, n whch for the purpose of easy calculaton, we decded to defne M = 1. h s the returned hts values for a partcular query, whle H p s the maxmum hts retreved from all h that have been recorded. The formula to defne the maxmum hts (), nvolved the use of nearest-neghbor concept, whch wll be explaned later. N p s the total number of query hts of all peers stored n the neghbor profle table: Fg. 5 Nearest-neghbor search space RESULTS sm(q,q ) = p ( q * q ) (q) * (q ) (1) H = (h ) () H h p R(q,q ) = + M sm(q,q ) N p ( ) (3) Nearest neghbor selecton: We determne our group of peers wthn the relevance value by usng the nearest neghbor prncpal. It s based on the fast algorthm for nearest neghbor search proposed n [15]. The purpose of the applcaton of nearest neghbor method s to avod comparng all the peers nsde the table because table wth sze of N wll requre N tmes comparson and relevance calculaton process. As we can see n Fg. 3, nearest neghbors n our context are the peers that resdes wthn the area of radus r. However, nstead of selectng a statc value [14], we decded to make the value r dynamc. We determned the dynamc r value by explotng the nequalty of trangle (Fg. 4). The nequaltes wll determne a bound for peer selectons and therefore, less relevance values wll be compared to the dstance r (Fg. 5). 187 We evaluate the performance of our searchng approach by extendng a peer-to-peer smulator called Peerware. We generate 100 peers wth a total of documents. Each node holds random number of documents between documents. The document collecton used s the Reuters-1578 document collecton whch appeared on the Reuters newswre n Three dfferent number of query set are used; q100 that contan 100 random query terms; q75 contans 75 queres and q50 wth 50 query terms. Each query terms contan between two to fve words. Each peer s country-based and each peer holds news about that partcular country. One country could have more than one peer representatves n the network. We compare our approach wth the Most-Query Hts (MQH) and Intellgent Search Mechansm (ISM) approaches. We compare the search approaches based on query recalls, number of messages used and search effcency. s are the number of query matches wth the content of each peer, whle number of messages used s the number of messages used to answer a query. Search effcency s the performance evaluaton parameter that s calculated by dvdng recalls wth number of messages used: Search effcency = (4)

5 J. Computer Sc., 5 (3): , 009 DISCUSSION Our experments showed that our approach (RNN) s effcent n terms of network usage compared to the other two searchng technques. The experments that employed q50 showed that our searchng approach recorded the hghest recall when compared to the ISM and MQH technques. The recall s 4.87% hgher compared to the MQH approach and slghtly over than ISM approach wth 1.67% more than ISM recall (Fg. 6). Fgure 7 shows the message usage for all three approaches for query set q50 n whch our approach recorded the hghest number of message usage than MQH and ISM (4.79 and.1% respectvely). However, we recorded hghest effcency wth 38.1% hgher than MQH and 8.8% effcency hgher than ISM (Fg. 8). RNN also recorded hghest recall when employng the q75 query set n the experment, our approach stll managed to record hghest recall; as shown n Fg. 9. The RNN search recorded 4.31% hgher recall than MQH and 0.85% hgher recall than ISM. The RNN recorded 9.4% messages hgher than MQH but t yeld better search effcency wth 16.5% Fg. 6: recorded for 50 queres searchng RNN also recorded hgher number of messages used than the ISM wth 5.1% hgher but the RNN approach regstered 0.6% hgher search effcency than ISM. and search effcency graph for experment usng the query set q75 are shown n Fg. 10 and 11 respectvely. Our experment usng q100 query set also showed that RNN approach recorded hgh recall than other search technque. As shown n Fg. 1, RNN recorded 1.67% hgher recall than MQH approach and 0.% hgher recall than ISM. In terms of message usage, Search effcency Fg. 8: Search Effcency for 50 queres searchng Fg. 9: recorded for 75 queres searchng MQH ISM Relevant (NN) Fg. 7: for 50 queres searchng Fg. 10: for 75 queres searchng 188

6 J. Computer Sc., 5 (3): , 009 Search effcency Search effcency MQH ISM Relevant (NN) 0.03 Fg. 11: Search effcency for 75 queres searchng MQH ISM R elevant (NN) Fg. 1: recorded for 100 queres searchng Fg. 13: for 100 queres searchng we can show n Fg. 13 that RNN approach recorded 3.01% less message than MQH and 8.5% messages less than ISM approach. In the same experment settng, we found out that RNN search s the most effcent wth 13.51% more effcent than MQH and 17.95% more effcent than ISM (Fg. 14). Fg. 14: Search Effcency for 100 queres searchng CONCLUSION Ths study explots the query content and query feedback data for developng flood-based search n unstructured peer-to-peer that s mnmal n cost but gvng hgh retreval. RNN explots very mnmal data and also nearest-neghbor concept to reduce the cost of searchng n unstructured peer-to-peer networks. Our smulaton tests showed that our searchng approach performs better than the other two flood-based searchng approaches that also use mnmal data and local ndces. We showed that by usng mnmal nformaton of query hts and smlarty, effcent search n unstructured peer-to-peer can be acheved ACKNOWLEDGEMENT The researchers would lke to express ther cordal thanks to Demetrs Zenalpour for gvng the permsson to use the full data set of Reuters-1578 document collecton and the Peerware smulator. REFERENCES 1. Grossel, Y. and R. Manfred, 009. Gtk-Gnutella. Rpeanu, M., 001. Peer-to-peer archtecture case study: Gnutella network. Proceedng of the 1st Internatonal Conference on Peer-to-Peer Computng, Aug. 7-9, IEEE Xplore Press, USA., pp: DOI: /PP Cohen, E. and S. Shenker, 00, Replcaton strateges n unstructured peer-to-peer networks. Proceedngs of the 00 Conference on Applcatons, Technologes, Archtectures and Protocols for Computer Communcatons, Aug. 19-3, ACM Press, New York, USA., pp:

7 J. Computer Sc., 5 (3): , Lv, Q., P. Cao, E.C.A.T. Labs-Research, K. L and S. Shenker, 00. Search and replcaton n unstructured peer-to-peer networks. Proceedngs of the 16th Internatonal Conference on Supercomputng, June -6, ACM Press, New York, USA., pp: Ratnasamy, S., P. Francs, M. Handley, R. Karp and S. Shenker, 001. A scalable contentaddressable network. Proceedngs of the 001 Conference on Applcatons, Technologes, Archtectures and Protocols for Computer Communcatons, ACM Press, San Dego, Calforna, USA., pp: Stoca, I., R. Morrs, D. Karger, M.F. Kaashoek and H. Balakrshnan, 001. Chord: A scalable peer-to-peer lokup servce for nternet applcatons. Comput. Commun. Rev., 31: &ETOC=RN&from=searchengne 7. Ramanathan, M.K., V. Kalogerak and J. Pruyne, 00. Fndng good peers n peer-to-peer networks. Proceedng of the Internatonal Symposum on Parallel and Dstrbuted Processng, Apr , IEEE Computer Socety, Washngton DC., USA., pp: DOI: /IPDPS Kwok, S.H., K.Y. Chan and Y.M. Cheung, 005. A server-medated peer-to-peer system. ACM SIGecom Exchanges, 5: Zenalpour-Yazt, D., V. Kalogerak and D. Gunopolus, 005. Explotng localty for scalable nformaton retreval n peer-to-peer networks. Inform. Syst., 30: Dmakopolous, V. and E. Ptoura, 003. A peer-topeer approach to resource dscovery n mult-agent systems. Lecture Notes Comput. Sc., 78: DOI: /b Yang, B. and H. Garca-Molna, 00. Effcent search n peer-to-peer networks. Proceedng of the Internatonal Conference on Dstrbuted Computng System, (ICDCS 0), Venna, Austra, pp: Papers/GarcaMolna-showDoc.pdf 1. Kolonar, G. and E. Ptoura, 004. Content-based routng of path queres n peer-to-peer systems. Adv. Database Technol., 99: edy7.pdf 13. Mchlmayr, E., 006, Ant algorthms for search n unstructured peer-to-peer networks. Proceedng of the nd Internatonal Conference on Data Engneerng Workshop, IEEE Computer Socety, Washngton DC., USA., pp: DOI: /ICDEW Ishak, I. and N. Salm, 008. Explotng query feedbacks for effcent query routng n unstructured peer-to-peer networks. Proceedng of the Internatonal Conference on Multmeda, Internet and Web Engneerng, August, World Academy of Scence, Engneerng and Technology, Sngapore, pp: Orchard, M.T., A fast nearest-neghbor search algorthm. Proceedng of the Internatonal Conference on Acoustcs, Speech and Sgnal Processng, Apr , IEEE Xplore Press, USA., pp: DOI: /ICASSP

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Resource Discovery in P2P Networks Using Evolutionary Neural Networks

Resource Discovery in P2P Networks Using Evolutionary Neural Networks > PAPER IDENTIFICATION NUMBER: 067-04 < Resource Dscovery n P2P Networks Usng Evolutonary Neural Networks Mkko A. VAPA, Nko P. KOTILAINEN, Annemar K. AUVINEN, Hekk M. KAINULAINEN, and Jarkko T. VUORI Abstract--

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

IJCTA Nov-Dec 2016 Available

IJCTA Nov-Dec 2016 Available Dr K Santh et al, Internatonal Journal of Computer Technology & Applcatons,Vol 7(6),773-779 Optmzed Route Technque for DSR Routng Protocol n MANET Dr.K.Santh, Assocate Professor, Dept. of Computer Scence,

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS

AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS AN INDEXING METHOD FOR SUPPORTING SPATIAL QUERIES IN STRUCTURED PEER-TO-PEER SYSTEMS Lngku Meng a, Wenun Xe a, *, Dan Lu a, b a School of Remote Sensng and Informaton Engneerng, Wuhan Unversty, Wuhan 4379,

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION 24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment JOURNAL OF COMPUTERS, VOL. 4, NO. 9, SEPTEMBER 2009 873 Improved Resource Allocaton Algorthms for Practcal Image Encodng n a Ubqutous Computng Envronment Manxong Dong, Long Zheng, Kaoru Ota, Song Guo School

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks

A Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,

More information

Optimizing Document Scoring for Query Retrieval

Optimizing Document Scoring for Query Retrieval Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes

A Low-Overhead Routing Protocol for Ad Hoc Networks with selfish nodes A Low-Oerhead Routng Protocol for Ad Hoc Networks wth selfsh nodes Dongbn Wang 1, Xaofeng Wang 2, Xangzhan Yu 3, Kacheng Q 1, Zhbn Xa 1 1 School of Software Engneerng, Bejng Unersty of Posts and Telecommuncatons,100876,

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network

Cost-Effective Lifetime Prediction Based Routing Protocol for Wireless Network Cost-Effectve Lfetme Predcton Based Routng Protocol for Wreless Network ABU MD. ZAFOR ALAM, MUHAMMAD ARIFUR RAHMAN, MOHAMMED ABUL HASAN 2,M. LUTFAR RAHMAN Faculty of Scence and IT, Daffodl Internatonal

More information

UB at GeoCLEF Department of Geography Abstract

UB at GeoCLEF Department of Geography   Abstract UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department

More information

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS

DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS DEAR: A DEVICE AND ENERGY AWARE ROUTING PROTOCOL FOR MOBILE AD HOC NETWORKS Arun Avudanayagam Yuguang Fang Wenjng Lou Department of Electrcal and Computer Engneerng Unversty of Florda Ganesvlle, FL 3261

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search

Sequential search. Building Java Programs Chapter 13. Sequential search. Sequential search Sequental search Buldng Java Programs Chapter 13 Searchng and Sortng sequental search: Locates a target value n an array/lst by examnng each element from start to fnsh. How many elements wll t need to

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Classic Term Weighting Technique for Mining Web Content Outliers

Classic Term Weighting Technique for Mining Web Content Outliers Internatonal Conference on Computatonal Technques and Artfcal Intellgence (ICCTAI'2012) Penang, Malaysa Classc Term Weghtng Technque for Mnng Web Content Outlers W.R. Wan Zulkfel, N. Mustapha, and A. Mustapha

More information

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks

Performance Improvement of Direct Diffusion Algorithm in Sensor Networks Mddle-East Journal of Scentfc Research 2 (): 566-574, 202 ISSN 990-9233 IDOSI Publcatons, 202 DOI: 0.5829/dos.mejsr.202.2..43 Performance Improvement of Drect Dffuson Algorthm n Sensor Networks Akbar Bemana

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

SAO: A Stream Index for Answering Linear Optimization Queries

SAO: A Stream Index for Answering Linear Optimization Queries SAO: A Stream Index for Answerng near Optmzaton Queres Gang uo Kun-ung Wu Phlp S. Yu IBM T.J. Watson Research Center {luog, klwu, psyu}@us.bm.com Abstract near optmzaton queres retreve the top-k tuples

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Federated Search of Text-Based Digital Libraries in Hierarchical Peer-to-Peer Networks

Federated Search of Text-Based Digital Libraries in Hierarchical Peer-to-Peer Networks Federated Search of Text-Based Dgtal Lbrares n Herarchcal Peer-to-Peer Networks Je Lu School of Computer Scence Carnege Mellon Unversty Pttsburgh, PA 15213 jelu@cs.cmu.edu Jame Callan School of Computer

More information

Querying by sketch geographical databases. Yu Han 1, a *

Querying by sketch geographical databases. Yu Han 1, a * 4th Internatonal Conference on Sensors, Measurement and Intellgent Materals (ICSMIM 2015) Queryng by sketch geographcal databases Yu Han 1, a * 1 Department of Basc Courses, Shenyang Insttute of Artllery,

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Internet Traffic Managers

Internet Traffic Managers Internet Traffc Managers Ibrahm Matta matta@cs.bu.edu www.cs.bu.edu/faculty/matta Computer Scence Department Boston Unversty Boston, MA 225 Jont work wth members of the WING group: Azer Bestavros, John

More information

Mining User Similarity Using Spatial-temporal Intersection

Mining User Similarity Using Spatial-temporal Intersection www.ijcsi.org 215 Mnng User Smlarty Usng Spatal-temporal Intersecton Ymn Wang 1, Rumn Hu 1, Wenhua Huang 1 and Jun Chen 1 1 Natonal Engneerng Research Center for Multmeda Software, School of Computer,

More information

A Novel Distributed Collaborative Filtering Algorithm and Its Implementation on P2P Overlay Network*

A Novel Distributed Collaborative Filtering Algorithm and Its Implementation on P2P Overlay Network* A Novel Dstrbuted Collaboratve Flterng Algorthm and Its Implementaton on P2P Overlay Network* Peng Han, Bo Xe, Fan Yang, Jajun Wang, and Rumn Shen Department of Computer Scence and Engneerng, Shangha Jao

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks 12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Information Retrieval

Information Retrieval Anmol Bhasn abhasn[at]cedar.buffalo.edu Moht Devnan mdevnan[at]cse.buffalo.edu Sprng 2005 #$ "% &'" (! Informaton Retreval )" " * + %, ##$ + *--. / "#,0, #'",,,#$ ", # " /,,#,0 1"%,2 '",, Documents are

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Revealing Paths of Relevant Information in Web Graphs

Revealing Paths of Relevant Information in Web Graphs Revealng Paths of Relevant Informaton n Web Graphs Georgos Kouzas 1, Vassleos Kolas 2, Ioanns Anagnostopoulos 1 and Eleftheros Kayafas 2 1 Unversty of the Aegean Department of Fnancal and Management Engneerng

More information

sensors ISSN

sensors ISSN Sensors 2011, 11, 5383-5401; do:10.3390/s110505383 OPEN ACCESS sensors ISSN 1424-8220 www.mdp.com/journal/sensors Artcle FRCA: A Fuzzy Relevance-Based Cluster Head Selecton Algorthm for Wreless Moble Ad-Hoc

More information

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like:

Outline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like: Self-Organzng Maps (SOM) Turgay İBRİKÇİ, PhD. Outlne Introducton Structures of SOM SOM Archtecture Neghborhoods SOM Algorthm Examples Summary 1 2 Unsupervsed Hebban Learnng US Hebban Learnng, Cntd 3 A

More information

A Genetic Algorithm Based Dynamic Load Balancing Scheme for Heterogeneous Distributed Systems

A Genetic Algorithm Based Dynamic Load Balancing Scheme for Heterogeneous Distributed Systems Proceedngs of the Internatonal Conference on Parallel and Dstrbuted Processng Technques and Applcatons, PDPTA 2008, Las Vegas, Nevada, USA, July 14-17, 2008, 2 Volumes. CSREA Press 2008, ISBN 1-60132-084-1

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

A Frame Packing Mechanism Using PDO Communication Service within CANopen

A Frame Packing Mechanism Using PDO Communication Service within CANopen 28 A Frame Packng Mechansm Usng PDO Communcaton Servce wthn CANopen Mnkoo Kang and Kejn Park Dvson of Industral & Informaton Systems Engneerng, Ajou Unversty, Suwon, Gyeongg-do, South Korea Summary The

More information

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors Optmal Fault-Tolerant Routng n Hypercubes Usng Extended Safety Vectors Je Wu Department of Computer Scence and Engneerng Florda Atlantc Unversty Boca Raton, FL 3343 Feng Gao, Zhongcheng L, and Ynghua Mn

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Future Generation Computer Systems

Future Generation Computer Systems Future Generaton Computer Systems 29 (2013) 1631 1644 Contents lsts avalable at ScVerse ScenceDrect Future Generaton Computer Systems journal homepage: www.elsever.com/locate/fgcs Gosspng for resource

More information

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,

More information

CACHE MEMORY DESIGN FOR INTERNET PROCESSORS

CACHE MEMORY DESIGN FOR INTERNET PROCESSORS CACHE MEMORY DESIGN FOR INTERNET PROCESSORS WE EVALUATE A SERIES OF THREE PROGRESSIVELY MORE AGGRESSIVE ROUTING-TABLE CACHE DESIGNS AND DEMONSTRATE THAT THE INCORPORATION OF HARDWARE CACHES INTO INTERNET

More information

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems Real-tme Fault-tolerant Schedulng Algorthm for Dstrbuted Computng Systems Yun Lng, Y Ouyang College of Computer Scence and Informaton Engneerng Zheang Gongshang Unversty Postal code: 310018 P.R.CHINA {ylng,

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol

Using Particle Swarm Optimization for Enhancing the Hierarchical Cell Relay Routing Protocol 2012 Thrd Internatonal Conference on Networkng and Computng Usng Partcle Swarm Optmzaton for Enhancng the Herarchcal Cell Relay Routng Protocol Hung-Y Ch Department of Electrcal Engneerng Natonal Sun Yat-Sen

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

Adaptive Power-Aware Prefetch in Wireless Networks

Adaptive Power-Aware Prefetch in Wireless Networks Adaptve Power-Aware Prefetch n Wreless Networks Langzhong Yn, Student Member, IEEE, and Guohong Cao, Member, IEEE Abstract Most of the prefetch technques used n the current cache management schemes do

More information

Enhancement of Infrequent Purchased Product Recommendation Using Data Mining Techniques

Enhancement of Infrequent Purchased Product Recommendation Using Data Mining Techniques Enhancement of Infrequent Purchased Product Recommendaton Usng Data Mnng Technques Noraswalza Abdullah, Yue Xu, Shlomo Geva, and Mark Loo Dscplne of Computer Scence Faculty of Scence and Technology Queensland

More information

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK

Wightman. Mobility. Quick Reference Guide THIS SPACE INTENTIONALLY LEFT BLANK Wghtman Moblty Quck Reference Gude THIS SPACE INTENTIONALLY LEFT BLANK WIGHTMAN MOBILITY BASICS How to Set Up Your Vocemal 1. On your phone s dal screen, press and hold 1 to access your vocemal. If your

More information

BRDPHHC: A Balance RDF Data Partitioning Algorithm based on Hybrid Hierarchical Clustering

BRDPHHC: A Balance RDF Data Partitioning Algorithm based on Hybrid Hierarchical Clustering 015 IEEE 17th Internatonal Conference on Hgh Performance Computng and Communcatons (HPCC), 015 IEEE 7th Internatonal Symposum on Cyberspace Safety and Securty (CSS), and 015 IEEE 1th Internatonal Conf

More information

Cost-efficient deployment of distributed software services

Cost-efficient deployment of distributed software services 1/30 Cost-effcent deployment of dstrbuted software servces csorba@tem.ntnu.no 2/30 Short ntroducton & contents Cost-effcent deployment of dstrbuted software servces Cost functons Bo-nspred decentralzed

More information

On the Efficiency of Swap-Based Clustering

On the Efficiency of Swap-Based Clustering On the Effcency of Swap-Based Clusterng Pas Fränt and Oll Vrmaok Department of Computer Scence, Unversty of Joensuu, Fnland {frant, ovrma}@cs.oensuu.f Abstract. Random swap-based clusterng s very smple

More information

Use of Genetic Algorithms in Efficient Scheduling for Multi Service Classes

Use of Genetic Algorithms in Efficient Scheduling for Multi Service Classes Use of Genetc Algorthms n Effcent Schedulng for Mult Servce Classes Shyamale Thlakawardana and Rahm Tafazoll Centre for Communcatons Systems Research (CCSR), Unversty of Surrey, Guldford, GU27XH, UK Abstract

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions SRB: Shared Runnng Buffers n Proxy to Explot Memory Localty of Multple Streamng Meda Sessons Songqng Chen,BoShen, Yong Yan, Sujoy Basu, and Xaodong Zhang Department of Computer Scence Moble and Meda System

More information

Minimum Cost Optimization of Multicast Wireless Networks with Network Coding

Minimum Cost Optimization of Multicast Wireless Networks with Network Coding Mnmum Cost Optmzaton of Multcast Wreless Networks wth Network Codng Chengyu Xong and Xaohua L Department of ECE, State Unversty of New York at Bnghamton, Bnghamton, NY 13902 Emal: {cxong1, xl}@bnghamton.edu

More information

Research Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks

Research Article Energy Efficient Interest Forwarding in NDN-Based Wireless Sensor Networks Moble Informaton Systems Volume 2016, Artcle ID 3127029, 15 pages http://dx.do.org/10.1155/2016/3127029 Research Artcle Energy Effcent Interest Forwardng n NDN-Based Wreless Sensor Networks Shua Gao, 1

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information