ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

Size: px
Start display at page:

Download "ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS"

Transcription

1 ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth Avenue Faifax, VA 22030, USA Potland, OR menasce@csgmuedu mohamedbennani@oaclecom Abstact Moden compute systems ae based on a wide vaiety of softwae seves, such as web seves, application seves, database seves, and mail seves The typical softwae achitectue of such seves includes a set of pocesses o that seve submitted to the seve Requests that aive at the seve and find all busy, ae placed in a queue Theads that ae busy executing compete fo hadwae esouces (eg, pocessos and I/O devices) at the machine whee the softwae seve uns It is impotant to be able to model softwae seves in a way that takes into account both softwae contention waiting fo and hadwae contention waiting fo pocessos and I/O devices This pape pesents analytical models fo a wide ange of multitheaded softwae seve achitectues: a) single class (ie, all have simila demands) with unlimited thead queue size, b) single class with limited thead queue size, c) multiclass with unlimited thead queue size, and d) multiclass with limited queue size Numeical esults ae pesented to illustate the use of the models 1 Intoduction Moden compute systems ae based on a wide vaiety of softwae seves that seve fom client pocesses Some examples of softwae seves include web seves, application seves, database seves, and mail seves The typical softwae achitectue of such seves includes a set of pocesses o that seve submitted to the seve Requests that aive at the seve and find all busy, ae placed in a queue Theads that ae busy executing compete fo hadwae esouces (eg, pocessos and I/O devices) at the machine whee the softwae seve uns Theefoe, it is impotant to be able to model softwae seves in a way that takes into account both softwae contention waiting fo and hadwae contention waiting fo pocessos and I/O devices This pape pesents analytical models fo a wide ange of multitheaded softwae seve achitectues: a) single class (ie, all have simila demands) with unlimited thead queue size, b) single class with limited thead queue size, c) multiclass with unlimited thead queue size, and d) multiclass with limited queue size This wok was suppoted in pat by the National Geospatial- Intelligence Agency (NGA) contact NMA The models pesented hee build on well-known modeling techniques: bith-death Makov chains [1], Mean Value Analysis (MVA) [4] fo single class queuing netwok models, and appoximate MVA (amva) [5] fo multiple class queueing netwok models We also use the well-known pinciples of hieachical modeling and iteative models The est of this pape is oganized as follows Section two pesents some backgound and notation Section thee pesents a model fo a single class softwae seve with an unlimited thead queue size The next section modifies the model to account fo thead queues of limited size Section five deals with the issue of multiple classes of fo both unlimited and limited queue size Finally section six pesents some concluding emaks 2 Basic Concepts and Notation The models used in this pape daw on the notion of closed queuing netwok (QN) models used to epesent compute systems Such models compise a collection of K devices visited by that may belong to diffeent classes, o wokloads A class of is typically associated to a collection of that have simila demands on the vaious esouces The sevice demand, D i,,of of class at device i is the total sevice time spent by a equest of class ove all visits to device i duing the (c) 2006 Menasce and Bennani All Rights Reseved 1/7

2 execution of the equest The solution to such QNs can be obtained though Mean Value Analysis [4] o appoximate MVA (amva) fo the case of multiple classes [5] Fo moe details on queuing netwoks, the eade is efeed to [3] The notation given in Table 1 is used thoughout the pape 3 Single-class Multitheaded Seve with Unlimited Queue Figue 1 displays a situation in which fo sevice aive to a multitheaded softwae seve that has M The undelying hadwae platfom used by all has pocessing and I/O esouces Aiving join a queue of waiting fo an available thead Once a thead to execute, it stats to compete with othe fo pocessing and I/O esouces The bottom pat of the figue shows queues fo the CPU and fo I/O It is also assumed in this section that all ae homogeneous in tems of thei sevice demands This assumption will be elaxed late in the pape Thus, we ae dealing with a single-class modeling situation aiving queue of waiting fo 1 completing and completion pocess of The ate at which complete is detemined by the solution of a lowe level model, in the fom of a queuing netwok (QN) Let X(k), k =1,, M, be the ate at which a thead completes its execution when thee ae k in execution This ate can be obtained by solving the closed QN model fo the hadwae subsystem composed of the CPU and disk when thee ae k concuent in execution The solution of this queuing netwok can be obtained though Mean Value Analysis (MVA) [3, 4] A state k in the Makov chain of Fig 2 epesents the numbe of in the system (waiting fo a thead o being executed by a thead) This Makov chain has an infinite numbe of states since thee is no limit on the numbe of in the queue The aival ate in the Makov chain (tansition ate to a highe numbeed neighboing state) is the aival ate of, λ, and the completion ate (tansition ate to a lowe numbeed neighboing state) is the completion ate of Note that since thee can be at most M in execution, the depatue ate is constant and equal to X(M) fo any state k>m The solution of this Makov chain, ie, the set of pobabilities P k,k =0,, can be obtained using the Genealized Bith-Death theoem [1, 3]: k 1 λ i P k = P 0 (1) μ i+1 i=0 Fo the model consideed in this subsection, λ i = λ i and μ i = X(i) fo i =0,,M and μ i = X(M) fo i>m M 0 1 k M M+1 (1) (2) (k) (k+1) (M) (M) (M) CPU Figue 2: Makov Chain fo the unlimited thead queue case The solution to the Makov chain of Fig 2 is given by Disk compute system shaed by all Figue 1: Multitheaded seve with unlimited queue In ode to model this type of softwae seve, we use the well-known pinciple of hieachical modeling At the softwae level, we use a Makov chain to model the aival { P0 λ P k = k /β(k) fo k =1,,M P 0 ρ k X(M) M /β(m) fo k>m whee: β(k) =X(1) X(2) X(k), ρ = λ/x(m), and P 0 =[1+ M λk β(k) + X(M)M β(m) ρm+1 1 ρ ] 1 (2) Note that the solution given above only exists when ρ<1 The aveage esponse time, R 0, can be easily computed fom the state pobabilities and fom Little s Law [1] as (c) 2006 Menasce and Bennani All Rights Reseved 2/7

3 K Numbe of devices (eg, pocessos, disks) in the compute system R Numbe of classes (wokloads) M total numbe of in the system N system size (maximum queue length plus numbe of in system) D i, sevice demand of class at device i U i, utilization of device i by class U i utilization of device i (U i = R =1 U i,) n i, aveage numbe of class queued at device i o using the device aveage numbe of class in execution ( = K i=1 n i,) aveage numbe of class in the system (waiting fo a thead o using a thead) Table 1: Notation R 0 = /λ, whee, the aveage numbe of in the system (waiting fo a thead o using a thead), is given by [ M ] = P 0 k λk β(k) + ρ (X(M)ρ)M (1 + M(1 ρ)) β(m) (1 ρ) 2 (3) The aveage numbe of in execution,,is given by = M 1 M 1 k P k + M [1 k=0 P k ] (4) Figue 3 shows the vaiation of the aveage esponse time R 0 as a function of the aveage aival ate λ The paametes used fo this example ae: Numbe of (M): 20 Sevice demand at the CPU (D CPU ): 0020 sec Sevice demand at the disk (D I/O ): 0015 sec Fo the paametes given above, X(20) = 4996 /sec, close to the maximum bound on thoughput which is 1/D CPU = 1/002 = 50 /sec Since ρ = λ/x(20) < 1, λ<4996 As the figue shows, as λ appoaches its maximum possible value, the esponse time goes to infinity vey fast The esponse time stays below 05 sec fo λ<49 /sec 4 Single-class Multitheaded Seve with Limited Queue Figue 4 displays a multitheaded seve with a limited queue fo stoing incoming The numbe of is M as in the unlimited queue size case but thee is a limit N on the total numbe of in the system (waiting fo a thead o being executed by a thead) The solution fo this case can be obtained following the same appoach as in section 3 The Makov chain model in this case, shown in Fig 5, has N +1 states A state k, (k =0,, N), epesents the numbe of in the Avg Response Time (sec) Aival ate (eq/sec) Figue 3: Aveage esponse time (sec) vs aival ate (eq/sec) fo the unlimited queue case with 20 system (waiting fo a thead o using a thead) The aival ate in the diagam is the aival ate of, λ, and the completion ate is the completion ate of Note that since thee can be at most M in execution, the depatue ate is constant and equal to X(M) fo any state k>m as in the pevious case The solution of this Makov Chain, ie, the values of the pobabilities P k,fok =(0,, N), of finding k in the system, can be obtained using the methods in [1, 3] The solution is given below { P0 λ P k = k /β(k) fo k =1,,M P 0 ρ k X(M) M /β(m) whee: β(k) =X(1) X(2) X(k), ρ = λ/x(m), and P 0 =[1+ M λk fo k = M +1,,N (5) β(k) + ρ λm (1 ρ N M ) β(m) (1 ρ) ] 1 (c) 2006 Menasce and Bennani All Rights Reseved 3/7

4 aiving queue of waiting fo 1 used in the unlimited queue case Thee is one additional paamete in this case, which is the system size N The figue shows two cuves, one fo N =25and anothe fo N =35 Max? Yes ejected No M completing Avg esponse time (sec) CPU Aival ate (eq/sec) n = 25 n = 35 Figue 4: queue Disk compute system shaed by all Multitheaded seve with limited thead The metics of inteest, namely the pobability of ejection P ej, the aveage thoughput X and the aveage esponse time R, can be easily computed fom the state pobabilities and fom Little s Law [1] as follows P ej = P n X = λ (1 P ej )= N X(k) P k R 0 = N k P k/x Figue 6 shows the vaiation of the aveage esponse time as a function of the aveage aival ate fo the limited queue case The paametes fo this example ae the same 0 1 k M N-1 N (1) (2) (k) (M) (M) (M) Figue 5: Makov Chain fo the limited thead queue case Figue 6: Aveage esponse time (sec) vs aival ate (eq/sec) fo the limited queue case with 20 and two values of the maximum numbe of in the system (N =25andN = 35) It is inteesting to obseve the shape of this cuve At low loads, the pobability that ae lost, P ej,is vey low Fo example, fo N = 25 and λ = 45 /sec, P ej =1% Howeve, as the load inceases, moe ae ejected and the effective aival ate to the system (equal to the system thoughput) inceases at asloweatewithλ Fo example, fo N =25and λ =70 /sec, P ej =287% Thus, only 499 /sec ae actually being accepted by the system fo execution This explains why the esponse time does not gow to infinity In fact, fo a vey lage value of λ, accepted will find (N M) 1 in the queue fo and all will be busy seving So, the aveage esponse time will become constant and equal to the sum of a constant aveage waiting time and a constant aveage execution time since all M ae busy and competing fo the hadwae esouces 5 Multi-class Multitheaded Seve We now elax the assumption that all have the same sevice demands Conside R diffeent classes of Class ( =1,,R) has an aival ate equal to λ /sec Thee ae K devices (eg, pocessos and I/O devices) and the sevice demand of a equest of class at esouce i is given by D i, Ifweweetousethesame two-level modeling appoach descibed in Sections 3 and 4 we would have a multidimensional Makov chain in which (c) 2006 Menasce and Bennani All Rights Reseved 4/7

5 the state would have to indicate the numbe of of each class in execution as well as the numbe of of each class in the queue This Makov chain would have a vey complex and lage state space Instead of consideing such a lage state space, we use an appoximation that was used by Lazowska et al [2] to model shaed domains in multipogamming systems The basic appoach woks basically as follows: 1 Initialization: Estimate the aveage numbe of in execution,, fo class and the aveage numbe of class in the system (executing o waiting fo a thead),, fo all classes =1,,R 2 Fo each class compute the aveage numbe, δ exec,of of all othe classes that ae in execution and the aveage numbe, δ syst, of of all othe classes that ae in the system (in execution o waiting fo a thead) 3 Solve a multiclass QN model using appoximate Mean Value Analysis (amva) [3] whee the population vecto is ( 1, 2,,n,, fo n =1to M δ exec In othe wods, since thee ae δ exec in execution fom classes othe than class, the numbe of allocated to class is the diffeence between the numbe of M and the numbe of allocated to the othe classes The solution of this QN model gives the class thoughput X ( 1, 2,,n,, fo n =1to M δ exec 4 A unidimensional Makov chain such as the ones discussed in sections 3 o 4 can now be built fo each class using λ as the aival ate and the thoughputs X ( 1, 2,,n,, as the completion ate The solution of this Makov chain povides new values of the aveage numbe of in execution 5 Repeat steps 2 though 4 until successive values of ae sufficiently close fo all classes 6 Compute the pefomance metics We now povide a detailed desciption of the algoithm to model multiclass multitheaded seves The pseudocode fo the initialization phase (step 1 above) is given in Fig 7 The pupose of this phase is to obtain an estimate fo and fo all classes This is done by fist computing the utilization of all devices using the Sevice Demand Law [3] If all utilizations ae below 100%, the fomula fo multiclass open QNs is used to estimate Othewise, we estimate using an appotionment facto based on the elative aival ate of class In both cases, we assume that the queue fo is initially empty, ie, = Note that the initial values of and will be modified though the iteation pocess in the emaining steps of the algoithm Figs 8 and 9 povide a detailed desciption of the iteation phase of the algoithm fo the unlimited and limited thead queue cases, espectively Note that the computation of the pobability distibutions fo P k follows in each case the fomulas used in Sections 3 and 4 fo evey device i do U i ( λ) R =1 U i,( λ)= R =1 λ D i, ; if (U i ( λ) < 10) fo all i then fo evey class do /* use open QN fomula to estimate */ fo evey device i do n i, U i, /(1 U i ); K i=1 n i,; /* adjust n so that it does not exceed M, the numbe of class estimated to be in execution */ min{,m } whee M = M / R s=1 nexec s ; /* assume no queuing fo at initialization */ else /* altenative initialization: use aival ate atios to estimate n */ fo evey class do M λ / s=r s=1 λ s ; /* assume no queuing fo at initialization */ Figue 7: Initialization Phase of the Pefomance Model fo a Multiclass Multitheaded Seve Table 2 shows the esults afte thee iteations fo a two-class multitheaded case with unlimited queue The following paametes wee used: M =10, λ 1 =25 /sec, λ 2 =20/sec, D CPU,1 =0014 sec, D I/O,1 =0020 sec, D CPU,2 =0018 sec, and D I/O,2 = 0012 sec Iteation 0 shows the esults of the initialization step Columns 7 and 13 show the absolute pecent elative eo between two consecutive values of Note that in iteation 3, this eo is aleady at 03% Moe iteations would yield even smalle eos The esponse time fo classes 1 and 2 at iteation 3 is seconds and (c) 2006 Menasce and Bennani All Rights Reseved 5/7

6 Iteation step: fo evey class =1, 2,, R do δ exec = nexec /*adjustethevalueofm */ M = M δ exec fo n =1, 2,, M do Call amva to compute X ( 1, 2,,n,, if M is not an intege then Call amva to compute X ( 1, 2,,M,, define a single class genealized bith-death model with λ = λ and death ates: μ (k) =X ( 1, 2,,k,,,fo1 k M,and μ (k) =X ( 1, 2,,M,, fo k> M compute the pobability distibution, P k, accoding to Section 3 P k = P 0 λk β(k),fo1 k M,and P k = P 0 ρ k μ (M ) M /β( M ),fok> M whee ρ = λ /μ (M ), β(k) =μ (1) μ (k), and [ P 0 = 1+ M λk /β(k)+ μ( M ) M ρ M +1 β( M ) (1 ρ) compute the pefomance metics as: aveage numbe [ of in the system: M = P 0 kλk /β(k)+ ρ [μ( M )ρ] M aveage thoughput: X = λ aveage esponse time: R 0, = /λ aveage numbe of in execution: = M 1 k P k + M [1 M 1 k=0 P k ] ] 1 (1+(M )(1 ρ)) β( M )(1 ρ) ] 2 Convegence test step: Repeat the iteation step until successive values of Compute final metics Retun the pefomance metics as computed in the last iteation ae sufficiently close fo all classes Figue 8: Iteative Phase of the Pefomance Model fo a Multiclass Multitheaded Seve with Unlimited Queue seconds, espectively 6 Concluding Remaks This pape showed how well-known analytic pefomance models can be used to assess the pefomance of multitheaded softwae seves The models use a combination of bith-death Makov chains, Mean Value Analysis, and hieachical modeling The softwae seve achitectues consideed in this pape cove a wide ange of situations found in moden seve-oiented systems The modeling appoach pesented hee takes into account both softwae and hadwae contention in single and multiclass situations Refeences [1] L Kleinock, Queueing Systems Volume I: Theoy, John Wiley & Sons, New Yok, NY, 1975 [2] E Lazowska, J Zahohan, GS Gaham, and KC Sevcik, Quantitative System Pefomance: compute system analysis using queuing netwok models, Pentice Hall, Uppe Saddle Rive, 1984 [3] DA Menascé, VAF Almeida, and LW Dowdy, Pefomance by Design: Compute Capacity Planning by Example, Pentice Hall, Uppe Saddle Rive, 2004 [4] M Reise and S Lavenbeg, Mean-value analysis of closed multi-chain queuing netwoks, J ACM,vol 27, no 2, 1980, pp [5] P Schweitze, Appoximate analysis of multiclass closed netwok of queues, Poc Intl Conf Stochastic Contol and Optimization, Amstedam, 1979 (c) 2006 Menasce and Bennani All Rights Reseved 6/7

7 Iteation 1 1 δ1 exec M1 R 0,1 % elative 2 2 δ2 exec M2 R 0,2 % elative eo 1 eo Table 2: Results fo multiclass unlimited thead queue case Iteation step: fo evey class =1, 2,, R do δ exec = nexec = nsyst /* Adjust the values of M and N */ δ syst M = M δ exec N = N δ syst fo n =1, 2,, M do Call amva to compute X ( 1, 2,,n,, if M is not an intege then Call amva to compute X ( 1, 2,,M,, define a single class genealized bith-death model with λ = λ and death ates: μ (k) =X ( 1, 2,,k,,fo1 k M,and μ (k) =X ( 1, 2,,M, fo M <k N compute the pobability distibution, P k, accoding to Section 4, as P k = P 0 λ k /β(k),fo1 k M,and P k = P 0 ρ k μ (M ) M /β( M ),fo M <k N whee ρ = λ /μ (M ), β(k) =μ (1) μ (k), and P 0 = [ 1+ M λk /β(k)+ ρ λ M Compute the pefomance metics as: aveage numbe of in the system: = N k P k aveage thoughput: X = N P k μ (k) pobability of ejection: P,ej = P N aveage esponse time: R 0, = / X aveage numbe of in execution: ] (1 ρ N M 1 ) β( M ) (1 ρ) = M 1 k P k + M [1 M 1 k=0 P k ] Convegence test step: Repeat the iteation step until successive values of Compute final metics: Retun the pefomance metics as computed in the last iteation ae sufficiently close fo all classes Figue 9: Iteative Phase of the Pefomance Model fo a Multiclass Multitheaded Seve with Limited Queue (c) 2006 Menasce and Bennani All Rights Reseved 7/7

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

High performance CUDA based CNN image processor

High performance CUDA based CNN image processor High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 9, SEPTEMBER 200 949 Dynamic Multiple Paity (DMP) Disk Aay fo Seial Tansaction Pocessing K.H. Yeung, Membe, IEEE, and T.S. Yum, Senio Membe, IEEE AbstactÐThe

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

CLOUD based storage systems are emerging to gain significant

CLOUD based storage systems are emerging to gain significant IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 5, NO. 2, APRIL-JUNE 2017 221 On the Latency and Enegy Efficiency of Distibuted Stoage Systems Akshay Kuma, Student Membe, IEEE, Ravi Tandon, Membe, IEEE, and

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

UCB CS61C : Machine Structures

UCB CS61C : Machine Structures inst.eecs.bekeley.edu/~cs61c UCB CS61C : Machine Stuctues Lectue SOE Dan Gacia Lectue 28 CPU Design : Pipelining to Impove Pefomance 2010-04-05 Stanfod Reseaches have invented a monitoing technique called

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Cardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions

Cardiac C-Arm CT. SNR Enhancement by Combining Multiple Retrospectively Motion Corrected FDK-Like Reconstructions Cadiac C-Am CT SNR Enhancement by Combining Multiple Retospectively Motion Coected FDK-Like Reconstuctions M. Pümme 1, L. Wigstöm 2,3, R. Fahig 2, G. Lauitsch 4, J. Honegge 1 1 Institute of Patten Recognition,

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler

POMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler POMDP: Intoduction to Patially Obsevable Makov Decision Pocesses Hossein Kamalzadeh, Michael Hahsle 2019-01-02 The R package pomdp povides an inteface to pomdp-solve, a solve (witten in C) fo Patially

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2 Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

Lecture 8 Introduction to Pipelines Adapated from slides by David Patterson

Lecture 8 Introduction to Pipelines Adapated from slides by David Patterson Lectue 8 Intoduction to Pipelines Adapated fom slides by David Patteson http://www-inst.eecs.bekeley.edu/~cs61c/ * 1 Review (1/3) Datapath is the hadwae that pefoms opeations necessay to execute pogams.

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

Modeling a shared medium access node with QoS distinction

Modeling a shared medium access node with QoS distinction Modeling a shaed medium access node with QoS distinction Matthias Gies, Jonas Geutet Compute Engineeing and Netwoks Laboatoy (TIK) Swiss Fedeal Institute of Technology Züich CH-8092 Züich, Switzeland email:

More information

Monte Carlo Simulation for the ECAT HRRT using GATE

Monte Carlo Simulation for the ECAT HRRT using GATE Monte Calo Simulation fo the ECAT HRRT using GATE F. Bataille, C. Comtat, Membe, IEEE, S. Jan, and R. Tébossen Abstact The ECAT HRRT (High Resolution Reseach Tomogaph, CPS Innovations, Knoxville, TN, U.S.A.)

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Bo Gu and Xiaoyan Hong*

Bo Gu and Xiaoyan Hong* Int. J. Ad Hoc and Ubiquitous Computing, Vol. 11, Nos. /3, 1 169 Tansition phase of connectivity fo wieless netwoks with gowing pocess Bo Gu and Xiaoyan Hong* Depatment of Compute Science, Univesity of

More information

Optimal Adaptive Learning for Image Retrieval

Optimal Adaptive Learning for Image Retrieval Optimal Adaptive Leaning fo Image Retieval ao Wang Dept of Compute Sci and ech singhua Univesity Beijing 00084, P. R. China Wangtao7@63.net Yong Rui Micosoft Reseach One Micosoft Way Redmond, WA 9805,

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

Lecture #22 Pipelining II, Cache I

Lecture #22 Pipelining II, Cache I inst.eecs.bekeley.edu/~cs61c CS61C : Machine Stuctues Lectue #22 Pipelining II, Cache I Wiewold cicuits 2008-7-29 http://www.maa.og/editoial/mathgames/mathgames_05_24_04.html http://www.quinapalus.com/wi-index.html

More information

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol

More information

ECE331: Hardware Organization and Design

ECE331: Hardware Organization and Design ECE331: Hadwae Oganization and Design Lectue 16: Pipelining Adapted fom Compute Oganization and Design, Patteson & Hennessy, UCB Last time: single cycle data path op System clock affects pimaily the Pogam

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation

More information

Performing real-time image processing on distributed computer systems

Performing real-time image processing on distributed computer systems Pefoming eal-time image pocessing on distibuted compute systems RADU DOBRESCU, MATEI DOBRESCU, DAN POPESCU "Politehnica" Univesity of Buchaest, Faculty of Contol and Computes, 313 Splaiul Independentei,

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

Experimental and numerical simulation of the flow over a spillway

Experimental and numerical simulation of the flow over a spillway Euopean Wate 57: 253-260, 2017. 2017 E.W. Publications Expeimental and numeical simulation of the flow ove a spillway A. Seafeim *, L. Avgeis, V. Hissanthou and K. Bellos Depatment of Civil Engineeing,

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

Class 21. N -body Techniques, Part 4

Class 21. N -body Techniques, Part 4 Class. N -body Techniques, Pat Tee Codes Efficiency can be inceased by gouping paticles togethe: Neaest paticles exet geatest foces diect summation. Distant paticles exet smallest foces teat in goups.

More information

An effective hop-by-hop Interest shaping mechanism for CCN communications

An effective hop-by-hop Interest shaping mechanism for CCN communications An effective hop-by-hop Inteest shaping mechanism fo CCN communications Natalya Rozhnova, Sege Fdida To cite this vesion: Natalya Rozhnova, Sege Fdida. An effective hop-by-hop Inteest shaping mechanism

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

On Adaptive Bandwidth Sharing with Rate Guarantees

On Adaptive Bandwidth Sharing with Rate Guarantees On Adaptive Bandwidth Shaing with Rate Guaantees N.G. Duffield y T. V. Lakshman D. Stiliadis y AT&T Laboatoies Bell Labs Rm A175, 180 Pak Avenue Lucent Technologies Floham Pak, 101 Cawfods Cone Road NJ

More information

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute

More information

Effects of Model Complexity on Generalization Performance of Convolutional Neural Networks

Effects of Model Complexity on Generalization Performance of Convolutional Neural Networks Effects of Model Complexity on Genealization Pefomance of Convolutional Neual Netwoks Tae-Jun Kim 1, Dongsu Zhang 2, and Joon Shik Kim 3 1 Seoul National Univesity, Seoul 151-742, Koea, E-mail: tjkim@bi.snu.ac.k

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1) 1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,

More information

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE 1 YAROSLAVTSEV A.F., 2 Al-THUNEIBAT S.A., 3 AL TAWALBEH N.A 1 Depatment of Netwoking, SSUTI, Novosibisk, Russia

More information

Approximating Euclidean Distance Transform with Simple Operations in Cellular Processor Arrays

Approximating Euclidean Distance Transform with Simple Operations in Cellular Processor Arrays 00 th Intenational Wokshop on Cellula Nanoscale Netwoks and thei Applications (CNNA) Appoximating Euclidean Distance Tansfom with Simple Opeations in Cellula Pocesso Aas Samad Razmjooei and Piot Dudek

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

Collaborative Filtering & Content-Based Recommending. CS 293S. T. Yang Slides based on R. Mooney at UT Austin

Collaborative Filtering & Content-Based Recommending. CS 293S. T. Yang Slides based on R. Mooney at UT Austin ollaboative Filteing & ontent-based Recommending S 293S. T. Yang Slides based on R. Mooney at UT Astin 1 Recommendation Systems Systems fo ecommending items (e.g. books, movies, msic, web pages, newsgop

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

CS 2461: Computer Architecture 1 Program performance and High Performance Processors

CS 2461: Computer Architecture 1 Program performance and High Performance Processors Couse Objectives: Whee ae we. CS 2461: Pogam pefomance and High Pefomance Pocessos Instucto: Pof. Bhagi Naahai Bits&bytes: Logic devices HW building blocks Pocesso: ISA, datapath Using building blocks

More information

COEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines

COEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines 1 COEN-4730 Compute Achitectue Lectue 2 Review of nstuction Sets and Pipelines Cistinel Ababei Dept. of Electical and Compute Engineeing Maquette Univesity Cedits: Slides adapted fom pesentations of Sudeep

More information

Strictly as per the compliance and regulations of:

Strictly as per the compliance and regulations of: Global Jounal of HUMAN SOCIAL SCIENCE Economics Volume 13 Issue Vesion 1.0 Yea 013 Type: Double Blind Pee Reviewed Intenational Reseach Jounal Publishe: Global Jounals Inc. (USA) Online ISSN: 49-460x &

More information

Introduction To Pipelining. Chapter Pipelining1 1

Introduction To Pipelining. Chapter Pipelining1 1 Intoduction To Pipelining Chapte 6.1 - Pipelining1 1 Mooe s Law Mooe s Law says that the numbe of pocessos on a chip doubles about evey 18 months. Given the data on the following two slides, is this tue?

More information

Achievable Catalog Size in Peer-to-Peer Video-on-Demand Systems

Achievable Catalog Size in Peer-to-Peer Video-on-Demand Systems Achievable Catalog Size in Pee-to-Pee Video-on-Demand Systems Yacine Boufkhad, Fabien Mathieu, Fabien De Montgolfie, Diego Peino, Lauent Viennot To cite this vesion: Yacine Boufkhad, Fabien Mathieu, Fabien

More information

OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO

OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO OPTIMAL KINEMATIC SYNTHESIS OF CRANK & SLOTTED LEVER QUICK RETURN MECHANISM FOR SPECIFIC STROKE & TIME RATIO Zeeshan A. Shaikh 1 and T.Y. Badguja 2 1,2 Depatment of Mechanical Engineeing, Late G. N. Sapkal

More information

A Novel Parallel Deadlock Detection Algorithm and Architecture

A Novel Parallel Deadlock Detection Algorithm and Architecture A Novel Paallel Deadlock Detection Aloithm and Achitectue Pun H. Shiu 2, Yudon Tan 2, Vincent J. Mooney III {ship, ydtan, mooney}@ece.atech.ed }@ece.atech.edu http://codesin codesin.ece.atech.eduedu,2

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220

More information

GTOC 9, Multiple Space Debris Rendezvous Trajectory Design in the J2 environment

GTOC 9, Multiple Space Debris Rendezvous Trajectory Design in the J2 environment GTOC 9, Multiple Space Debis Rendezvous Tajectoy Design in the J envionment Macus Hallmann, Makus Schlottee, Ansga Heidecke, Maco Sagliano Fedeico Fumenti, Volke Maiwald, René Schwaz Institute of Space

More information

Parallel processing model for XML parsing

Parallel processing model for XML parsing Recent Reseaches in Communications, Signals and nfomation Technology Paallel pocessing model fo XML pasing ADRANA GEORGEVA Fac. Applied Mathematics and nfomatics Technical Univesity of Sofia, TU-Sofia

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

An Assessment of the Efficiency of Close-Range Photogrammetry for Developing a Photo-Based Scanning Systeminthe Shams Tabrizi Minaret in Khoy City

An Assessment of the Efficiency of Close-Range Photogrammetry for Developing a Photo-Based Scanning Systeminthe Shams Tabrizi Minaret in Khoy City Austalian Jounal of Basic and Applied Sciences, 5(1): 80-85, 011 ISSN 1991-8178 An Assessment of the Efficiency of Close-Range Photogammety fo Developing a Photo-Based Scanning Systeminthe Shams Tabizi

More information

High Performance Computing on GPU for Electromagnetic Logging

High Performance Computing on GPU for Electromagnetic Logging Intenational Confeence "Paallel and Distiuted Computing Systems" High Pefomance Computing on GPU fo lectomagnetic Logging Glinskikh V.N. Kontoovich A.. pov M.I. Tofimuk Institute of Petoleum Geology and

More information

A Neural Network Model for Storing and Retrieving 2D Images of Rotated 3D Object Using Principal Components

A Neural Network Model for Storing and Retrieving 2D Images of Rotated 3D Object Using Principal Components A Neual Netwok Model fo Stong and Reteving 2D Images of Rotated 3D Object Using Pncipal Components Tsukasa AMANO, Shuichi KUROGI, Ayako EGUCHI, Takeshi NISHIDA, Yasuhio FUCHIKAWA Depatment of Contol Engineeng,

More information

Lecture 27: Voronoi Diagrams

Lecture 27: Voronoi Diagrams We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the

More information

Lecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining

Lecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining EE 341 Lectue # 12 Instucto: Zeshan hishti zeshan@ece.pdx.edu Novembe 10, 2014 Potland State Univesity asic Pocessing Unit ontol Signals Hadwied ontol Datapath contol signals Dealing with memoy delay Pipelining

More information

Ethernet PON (epon): Design and Analysis of an Optical Access Network.

Ethernet PON (epon): Design and Analysis of an Optical Access Network. Ethenet PON epon: Design and Analysis of an Optical Access Netwo. Glen Kame Depatment of Compute Science Univesity of Califonia, Davis, CA 9566, USA Tel:.530.297.527; Fax:.530.297.530 E-mail: ame@cs.ucdavis.edu

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

Reachable State Spaces of Distributed Deadlock Avoidance Protocols

Reachable State Spaces of Distributed Deadlock Avoidance Protocols Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

A Full-mode FME VLSI Architecture Based on 8x8/4x4 Adaptive Hadamard Transform For QFHD H.264/AVC Encoder

A Full-mode FME VLSI Architecture Based on 8x8/4x4 Adaptive Hadamard Transform For QFHD H.264/AVC Encoder 20 IEEE/IFIP 9th Intenational Confeence on VLSI and System-on-Chip A Full-mode FME VLSI Achitectue Based on 8x8/ Adaptive Hadamad Tansfom Fo QFHD H264/AVC Encode Jialiang Liu, Xinhua Chen College of Infomation

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information