Embeddings into Crossed Cubes

Size: px
Start display at page:

Download "Embeddings into Crossed Cubes"

Transcription

1 Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability fo geneal pupose paallel pocessing. An attactive vesion of the hypecube is the cossed cube. It peseves the impotant popeties of the hypecube and most impotantly educes the diamete by a facto of two. In this pape, we show the ability of the cossed cube as a vesatile achitectue to simulate othe inteconnection netwoks efficiently. We pesent new schemes to embed complete binay tees, complete quad tees, and cycles into cossed cubes. Index Tems- binay tees, cycles, dilation, embedding, expansion, hypecubes, cossed cubes. I. NTRODUCTION Hypecube achitectues ae loosely coupled paallel pocessos based on the binay cube netwok. Paallel computes based on the hypecube topology have gained widespead acceptance in paallel computing. Recently, many machines based on the hypecube have been designed and made commecially available. The hypecube offes a ich inteconnection topology with lage bandwidth, logaithmic diamete, simple outing and boadcasting of data, ecusive stuctue that is natually suited to divide and conque applications, and the ability to simulate othe inteconnection netwoks with minimum ovehead [2, 11, 14, 15, 20, 21]. Due to the populaity of the hypecube, many vaiations of the hypecube topology have been poposed to impove on its popeties and computational powe. El-Amaway and Latifi [7] poposed the folded hypecube to educe the diamete and the taffic congestion with little hadwae ovehead. Pepaata and Vuillemin [18] intoduced the cube-connected cycles in which the degee of the diamete was educed to 3. Efe [6] poposed an attactive vesion of the hypecube called the cossed cube, whee peliminay studies poved that the cossed cube peseves many of the attactive popeties of the hypecube and moe impotantly educes the diamete by a facto of two [1, 4, 6, 8, 9, 22]. This implies that the cossed cube has an advantage ove the hypecube when data communication is of majo concen. It is well known that fo paallel achitectues, data communication cost dominates computation cost. Theefoe, it is wothwhile to make compaative studies on cossed cubes and othe inteconnection netwoks, and exploe the advantages povided by them. The poblem of embedding one inteconnection netwok into anothe is vey impotant in the aea of paallel computing fo potability of algoithms acoss vaious achitectues, layout of cicuits in VLSI, and mapping logical data stuctues into compute memoies. * Depatment of Compute Science, Zaqa Pivate Univesity, Jodan, abuelub@zpu.edu.jo The impotance of binay tees comes fom the fact that this class of stuctues is useful in the solution of banded and spase systems, by diect elimination, and captues the essence of divide and conques algoithms. Embedding binay tees into othe inteconnection netwoks attacted the attention of many eseaches. Baasch et al. have consideed embedding complete binay tees into genealized hypecubes [2], while Dingle and Sudboough consideed simulation of binay tees and X-tees on pyamid netwoks [5]. Quad tees ae becoming an impotant technique in the domain of image pocessing, compute gaphics, obotics, computational geomety, and geogaphic infomation systems [3, 17, 19]. This hieachical stuctue is based on the pinciple of ecusive decomposition, which is simila to divide and conque methods. Mapping quad tees into othe inteconnection netwoks attacted the attention of many eseaches [14]. The poblem of embedding ings o cycles into othe inteconnection netwoks has been studied by many eseaches. It is well known that ings can be embedded into hypecubes using cyclic Gay codes [20]. Latifi and Zheng [12] genealized the cyclic Gay code method to embed ings into twisted cubes. On the othe hand, othe eseaches addessed the poblem of embedding ings into fault-fee and faulty topologies [9, 12, 13, 14, 16, 20] o the Hamiltonicity of such stuctues in fault-fee and faulty envionments [1, 8, 10, 11]. The emainde of this pape is oganized as follows. In section 2, we establish a few peliminay definitions and notations. Section 3 explains a scheme to embed complete binay tees into cossed cubes. Section 4 pesents a ecusive technique to embed complete quad tees. In section 5, we extend the Gay code scheme to embed cycles into cossed cubes. Finally, section 6 concludes the pape and discusses some futue possible wok. II. DIFINITIONS AND NOTATIONS In this pape, we use undiected gaphs to model inteconnection netwoks. Each vetex epesents a pocesso and each edge a communication link between pocessos. The embedding of a guest gaph G = (V G, E G ) into a host gaph H = (V H, E H ) is an injective mapping f fom V G to V H, whee V G, E G and V H, E H ae the vetex and edge sets of G and H, espectively, and whee V H V G. We conside a complete binay tee of height n-1, a complete quad tee of height n-1, and a cycle of size n, denoted CB n, CQ n, and C n, espectively, as guest gaphs and a cossed cube of dimension n, denoted XQ n, as a host gaph. Two cost functions, dilation and expansion often measue the quality of an embedding. If u and v ae two nodes in G, then the distance fom u to v, d = (u, v), is the length of the shotest path fom u to v. The dilation D is the maximum distance in H between the images of

2 adjacent vetices of G, D = max {d(f(u), f(v)), whee u v E G }. The expansion E is the atio of the cadinality of the host vetex set to the cadinality of the guest vetex set, E = V H / V G. Minimizing each of these measuements has a diect implication on the quality of the simulation of the guest netwok by the coesponding host netwok. The dilation of an embedding measues how fa apat neighboing guest pocessos ae placed in the host netwok. Clealy, if adjacent guest pocessos ae placed fa apat in the host netwok, then thee will be a significant degadation in simulation due to the long length of the communication path between them. The expansion of an embedding measues how much lage is the host netwok than the guest netwok duing the simulation. We want to minimize expansion, as we want to use the smallest possible host netwok that has at least as many pocessos as in the guest netwok. In eality, we usually have a fixed size host netwok and we may have to conside many-to-one embedding fo lage guest netwoks. When the size of the guest netwok is not equal to the size of the host netwok in tems of the numbe of pocessos, then we ty to find the smallest host netwok that has at least as many pocessos as the guest netwok. Such a host netwok is efeed to as the optimal host netwok. A hypecube of dimension n, denoted by Q n, is an undiected gaph consisting of 2 n vetices labeled fom 0 to 2 n -1 and such that thee is an edge between any two vetices if and only if the binay epesentation of thei labels diffes in exactly one bit position. A complete binay tee of height n-1, denoted by CB n, is an undiected gaph consisting of 2 n -1 vetices and such that evey vetex of depth less than n-1 has exactly two sons and evey vetex of depth n-1 is a leaf. A complete quad tee of height n-1, denoted by CQ n, is an undiected gaph consisting of (4 n -1)/3 vetices and such that evey vetex of depth less than n-1 has exactly fou sons and evey vetex of depth n-1 is a leaf. A cycle of size n, denoted C n, is an undiected gaph consisting of n vetices labeled fom v 1 to v n, such that node v i is a neighbo with node v (i+1)mod n, 1 i n. A path (v o, v 1, v 2,, v n-1 ) is a sequence of nodes such that each two consecutive nodes ae adjacent. A cycle o a cicuit is called a Hamiltonian cicuit if it taveses evey node of G exactly once. The cossed cube is defined ecusively as follows. Let G be any undiected labeled gaph, then G b is obtained fom G by pefixing evey vetex label with b. Two binay stings x = x 1 x 0 and y = y 1 y 0, each of length two, ae paielated if and only if (x, y) {(00, 00), (10, 10), (01, 11), (11, 01)}. Now, we define a cossed cube of dimension n, denoted XQ n, as an undiected gaph consisting of 2 n vetices labeled fom 0 to 2 n -1 and defined ecusively as following: 1. XQ 1 is the complete gaph on two vetices with labels 0 and Fo n > 1, XQ n consists of two copies of XQ n-1 one pefixed by 0, XQ 0 n-1, and the othe by 1, XQ1 n-1. Two vetices u = 0u n-2...u 0 XQ 0 n-1 and v = 1v n-2...v 0 XQ 1 n-1 ae adjacent, if and only if: a. u n-2 = v n-2, if n is even, and b. Fo 0 i (n-1)/2, u 2i+1 u 2i and v 2i+1 v 2i ae paielated. Figue 1 shows cossed cubes of dimension 3. XQ n is constucted ecusively based on the constuction of XQ n-1 by pasting togethe a copy of XQ 0 n-1 and the mio image of XQ 1 n-1, then adding the appopiate links between the two copies accoding to the pai-elated elationship. Fo claity, we view the cossed cube XQ n as a [2 x 2 n-1 ] gid. If the gid is patitioned hoizontally into two equal pats, then all nodes above the hoizontal line have a 0 as a pefix, while all nodes below the hoizontal line have a 1 as a pefix Figue 1: The cossed cube XQ 3. III. EMBEDDING COMPLETE BINARY TREES This section descibes ou scheme to embed a complete binay tee CB n into a cossed cube XQ n with dilation two and unit expansion. Ou scheme is based on the inode labeling to embed CB n into XQ n in a staight fowad way. The inode embedding is constucted by Algoithm Embedding Complete Binay Tee (ECBT). Algoithm ECBT Label the nodes of the complete binay tee based on the inode tavesal using binay epesentation. Map each node of the complete binay tee to the node in the cossed cube with the coesponding binay epesentation. Theoem 1: Fo all n, the inode labeling of the complete binay tee embeds CB n within the cossed cube XQ n with dilation two. Poof: Let β k be the binay sting of length k with 1 in all positions. Fo n 3, the inode embedding is shown in Figue 2. Fo n > 3, we pove the theoem by induction on the height of the binay tee. Ou induction basis is CB 3, a dilation two embedding of CB 3 into XQ 3 is shown in Figue 2. Assume the theoem is tue fo an embedding of CB n-1 into XQ n-1. We now pove that the theoem is tue fo the embedding of CB n into XQ n. In XQ n, conside the two subcubes XQ 0 n-1 and XQ 1 n-1. By induction hypothesis, we can embed CB n-1 into XQ 0 n-1 and XQ 1 n-1, with dilation two. Since the numbe of nodes in CB n-1 is less than the numbe of nodes in XQ n-1 by one, then XQ 0 n-1 and XQ 1 n-1 contain two exta-unused nodes located at addesses 01β n-2 and 11β n-2, espectively. We can use the exta-unused node in XQ 0 n-1, the CB n-1 of XQ 0 n-1, and the CB n-1 of XQ 1 n-1 to constuct the complete binay tee CB n with 2 n -1 nodes. Next, we pove that the dilation of this embedding is two. We again use the outing algoithm of [12] to show that the length of the shotest path fom the oot of CB n to any of its childen is of length two. Let l be the shotest path fom the oot of CB n to the oot l of the left complete

3 binay subtee LCB n-1 and be the shotest path fom the oot of CB n to the oot of the ight complete binay subtee RCB n-1. will appea at addess 01β n-2, l at addess 00β n-2, and at addess 10β n-2. Notice that, l, and ae identical except fo the left most two bits. By using the outing algoithm, the shotest paths fom 01β n-2 to 00β n-2 and fom 01β n-2 to 10β n-2 ae of length two. So, the dilation of this embedding is two. As an illustation to the esulted embedding, in the lowest level, each edge fom a left child to its paent is mapped to the coesponding cossed cube edge between the images of the two nodes, while the edge between a ight child to its paent is mapped to a path of length two, fom the ight child to the left child and fom the left child to the paent. In the highe level, each edge fom a left child, o a ight child, to its paent is mapped to the coesponding cossed cube edge between the images of the two nodes. In all highe levels, each edge fom a left child, o a ight child, to its paent is mapped to a path of length two. Notice that the inode embedding is vey simple and staight fowad. 001 Figue 2: The inode embedding of CB 3 into XQ 3. IV. EMBEDDING QUAD TREES This section descibes ou ecusive scheme to embed a complete quad tee CQ n into its optimal cossed cube XQ 2nwith dilation two and unit expansion. We poceed in fou 1 steps. In the fist step, CQ n is decomposed into a fou complete quad sub tees; a left complete quad sub tee ACQ n-1 with oot a, a left middle complete quad sub tee BCQ n-1 with oot b, a ight middle complete quad sub tee CCQ n-1 with oot c, a ight complete quad sub tee DCQ n-1 with oot d, and a oot. In the second step, XQ 2n-1 is decomposed into fou sub cubes XQ 00, XQ01, XQ11 2n-, and 3 XQ10. In the thid step, ACQ is embedded into XQ 00, BCQ is embedded into XQ01, CCQ is embedded into XQ 11, DCQ n-1 is embedded into XQ10, and the oot is embedded into one of the unused nodes in XO 00. In the last step, we constuct CQ by finding the n paths a, b, c, and d, each of at most length two. The embedding pocess is continued ecusively by decomposing the complete quad sub tees and the cossed sub cubes, epeating the above steps, until we each the leaves of the complete quad tee. At the bottom level of the complete quad tee, each complete quad sub tee with 5 nodes is mapped into a cossed sub cube of dimension 3. Next, we pesent Algoithm Embed Complete Quad Tee (ECQT) that uses a ecusive divide and conques technique to embed a complete quad tee CQ n into its optimal cossed cube XQ 2n-1. Algoithm ECQT Let δ i be the binay sting of length n with a 1 in position i and 0 in all othe positions, θ k be the binay sting of length k with 0 in all positions, and be the xo opeato. Decompose CQ n to ACQ n-1, BCQ n-1, CCQ n-1, DCQ n-1, and. Decompose XQ 2n-1 to XQ 00, XQ01, XQ 11, and XQ10. Map the quad sub tees into the cossed sub cubes as follows: a. Embed ACQ n-1 into XQ 00, BCQ n-1 into XQ 01, CCQ n-1 into XQ11, and DCQ n-1 into XQ 10. a, b, c, and d will appea at addesses 000θ 2n-4, 010θ 2n-4, 110θ 2n-4, and 100θ 2n-4,, espectively. b. Tanslate the embeddings in XQ 00 and XQ 10 by complementing the ()th bit of each node. Fomally, if a tee node was mapped to addess x then afte the tanslation it will appea at addess x δ. Afte the tanslation, the left oot a and the ight oot d will appea at addesses 001θ and 101θ 2n-4, espectively. Theefoe, the final position of a, b, c, and d ae 001θ 2n-4, 010θ 2n-4, 110θ 2n-4, and 101θ 2n-4,, espectively. c. Map the oot into the node with label 0 in XQ 00. Constuct CQ n fom ACQ n-1, BCQ n-1, CQ n-1, DCQ n-1, and by finding the fou paths ~a, ~b, ~c, and ~d. The edges -a and -b of CQ n ae mapped to paths of length one in XO 2n-1, while the edges -c and -d ae mapped to paths of length two. The shotest paths fom to c and fom to d ae 000θ 2n-4-010θ 2n-4-110θ 2n-4 and 000θ 2n-4-100θ 2n-4-101θ 2n-4,espectively. Theoem 2: Fo all n, Algoithm ECQT maps the complete quad tee CQ n within the cossed cube XQ 2n-1 with dilation two and unit expansion. Poof: Fo n = 1, CQ 1 can be easily embedded into XQ 1. Fo n = 2, the existence of a mapping with dilation two is shown in Figue 4. Since the cossed cube is vetex symmetic, then we can elabel the cossed cube and any of the cone nodes of the sub cube XQ 3 can be the oot.

4 Figues 4-b and 4-c show two diffeent kinds of possible embeddings that might be used duing the embedding pocess. Fo n > 2, we pove this by induction on the height of the complete quad tee CQ n. Ou induction basis is CQ 3, a dilation two mapping of CQ 3 into XQ 5 is shown in Figue 5. Note that the figue shows only the positions of the oots, as the est of the embedding follows diectly fom Figue 4. Assume the theoem is tue fo a mapping of CQ n-1 in XQ. Now, we pove that the theoem is tue fo the embedding of CQ n in XQ 2n-1. In XQ 2n-1, conside a b the fou sub cubes XQ 00, XQ01, XQ11, and XQ10 2n-. By induction hypothesis, thee exist a dilation two 3 mapping fom CQ n-1 to XQ 00, XQ01, XQ11, and XQ 10. Since the numbe of nodes in CQ is less than the numbe of nodes in XQ, then XQ 00, XQ01, XQ 11, and XQ10 contain exta unused nodes. Now, we can use the unused node with label 0 in XQ 00, the CQ n-1 of XQ 00, the CQ n-1 of XQ01, the CQ n-1 of XQ 11, and the CQ of XQ 10 to constuct the complete quad tee CQ n. To pove that the dilation of this mapping is two, we need to show that the length of the shotest path fom the oot to any of its fou childen is at most two. Clealy, the length of the paths ~a and ~b is one since they ae mapped diectly to edges in the cossed cube. Let ~c be the shotest path fom the oot of CQ n to the oot c of the ight middle complete quad sub tee CCQ n-1 and ~d be the shotest path fom the oot of CQ n to the oot d of the ight complete quad sub tee DCQ n-1. will appea at addess 000θ 2n-4, c will appea at addess 110θ 2n-4, and d will appea at addess 101θ 2n-4. Notice, that if we goup the addesses of, c, and d into pais of bits, fom ight to left, then they ae pai-elated except fo the left most thee bits. By using the outing algoithm of [6], the shotest path fom 000θ 2n-4 to 110θ 2n-4 is 000θ 2n-4-010θ 2n-4-110θ 2n-4 and fom 000θ 2n-4 to 101θ 2n-4 is 000θ 2n-4-100θ 2n-4-101θ 2n-4. So, the length of the paths ~c and ~d ae two. Theefoe, the dilation of this embedding is two. a b c d d Figue 5: Embedding CQ 3 into XQ 5. V. EMBEDDING CYCLES Given a cycle C 2 n with 2 n nodes, conside the poblem of assigning the cycle nodes to the nodes of the cossed cube XQ n such that adjacency is peseved. Now, given any two adjacent nodes in the cycle, thei images by this embedding should be neighbos in the cossed cube though some dimension i, whee 1 i n. We can view such an embedding as a sequence of dimensions cossed by adjacent nodes. We call such a sequence the embedding sequence, denoted by ES = (d 1, d 2,..., d 2 n), whee d i {1,..., n} fo all 1 i 2 n. Figue 6 shows two diffeent embeddings of the cycle C 2 3 into the cossed cube XQ 3. It is moe convenient to view the embedded cycle as will as the cossed cube in the way shown in Figue 6. The embedding sequence of C 2 3 is ES = (1, 3, 1, 2, 1, 3, 1, 2). Fo example, in Figue 6-a, notice that nodes 000 and 001 ae connected by a link though dimension 1, 001 and 111 ae connected by a link though dimension 3, 111 and 110 ae connected by a link though dimension 1, 110 and 100 ae connected by a link though dimension 2, and so on. The embedding sequence ES can be geneated using Algoithm ES. Algoithm ES Let n be the dimension of the cossed cube and the vetical ba be the concatenation opeato. ES 1 Fo i 3 to n do ES ES i ES ES ES 2 ES 2 c a (a) b b c d c a d (b) (c) Figue 4: Embedding CQ 1 into the sub cube XQ 3. The embedding sequence is geneated by applying Algoithm ES on n, whee n is the dimension of the cossed cube. The numbe of nodes in the cossed cube is equal to the numbe of nodes in the embedded cycle, which is 2 n nodes. Thus, the embedding sequence of the cycle C 2 4 is ES = (1, 3, 1, 4, 1, 3, 1, 2, 1, 3, 1, 4, 1, 3, 1, 2) and the embedding sequence of the cycle C 2 5 is ES = (1, 3, 1, 4, 1, 3, 1, 5, 1, 3, 1, 4, 1, 3, 1, 2, 1, 3, 1, 4, 1, 3, 1, 5, 1, 3, 1, 4, 1, 3, 1, 2). The embedding sequence coesponds to the extended binay-eflected Gay code embedding of a cycle into a cossed cube. The binay-eflected Gay code is the

5 most common technique to embed a cycle into a fault-fee hypecube. Notice that the same embedding sequence may esult in diffeent embeddings of C 2 n into XQ n depending on the cossed cube node that initiates the cycle constuction. Among all diffeent embeddings, we ae inteested in one kind. The embedding when the node that initiates the cycle constuction in the cossed cube is the uppe leftmost node, node with label 0. This will not violate the genealization of the technique since the cossed cube is node and vetex symmetic, which means that we can elabel the nodes, whee any node can be labeled as node 0, and hence initiates the constuction of the cycle. In Figue 6-a, the cycle is initiated by node 000, while in Figue 6-b the cycle is initiated by node (a) Node 000 initiating the embedding sequence. (b) Node 001 initiating the embedding sequence. Figue 6: The embedding sequence. Theoem 3: Fo evey n, Algoithm ES will geneate the embedding sequence to constuct a cycle of size 2 n in a cossed cube of dimension n. Poof: We pove this by induction on the dimension of the cossed cube. Ou induction basis is XQ 2, it is tivial that a cycle of size 4 can be easily constucted in XQ 2 using the embedding sequence ES = (1, 2, 1, 2). Assume the theoem is tue fo the constuction of a cycle of size 2 n-1 in a cossed cube of dimension n-1. We now pove that the theoem is tue fo the constuction of C 2 n in XQ n. Let G be any undiected labeled gaph, then G b is obtained fom G by pefixing evey vetex label with b. Conside the two cossed sub cubes XQ 0 n-1 and XQ 1 n-1. By induction hypothesis, we can constuct a cycle of size 2 n-1 in both XQ 0 n-1 and XQ 1 n-1. Let thei embedding sequence be ES = S n-1 2 S n-1 2, whee, S n is a sequence of dimensions ecusively defined as follows: S 2 = 1 and S n-1 = S n-2 n S n- 2. Now, we combine two cycles, each of size 2 n-1, to come up with a cycle of size 2 n. This is done by eplacing the fist link that goes though dimension 2 of the fist cycle and the second link that goes though dimension 2 of the second cycle by two links that go though dimension n. The embedding sequence of the new cycle C 2 n is ES = S n- 1 n S n-1 2 S n-1 n S n-1 2 = S n 2 S n 2, which is the same embedding sequence geneated by Algoithm ES Next, we pesent Algoithm Hamiltonian Cicuit (HC) that uses a ecusive divide and conques technique to embed a cycle C 2 n into a cossed cube XQ n. Algoithm HC Patition XQ n into 2 n-3 disjoint cossed cubes, each of dimension 3. Embed the cycle C 2 3 into each sub cube using the embedding sequence ES = (1, 3, 1, 2, 1, 3, 1, 2). Connect the 2 n-3 cycles, each of size 8, though the uppe, o lowe, links to come up with a cycle of size C 2 n. Theoem 4: Fo evey n, Algoithm HC will embed a Hamiltonian cycle of size 2 n in a cossed cube of dimension n. Poof: We pove this by induction on the dimension of the cossed cube. Ou induction basis is XQ 3, the embedding of a cycle of size 2 3 into a cossed cube of dimension 3 is shown in Figue 6. Assume the theoem is tue fo the constuction of a cycle of size 2 n-1 in a cossed cube of dimension n-1. We now pove that the theoem is tue fo the constuction of C 2 n in XQ n. Conside the two cossed sub cubes XQ 0 n-1 and XQ 1 n-1. By induction hypothesis, we can constuct a cycle of size 2 n-1 in both XQ 0 n-1 and XQ 1 n-1. Now, we combine two cycles, each of size 2 n-1, to come up with a cycle of size 2 n. This is done by eplacing the fist link that goes though dimension 2 of the fist cycle constucted in XQ 0 n-1 and the fist link that goes though dimension 2 in of the second cycle constucted in XQ 1 n-1 by links that go though dimension n. Note the use of the uppe links of dimension n when the embedding sequence is geneated by node 0, while the lowe cossed links of dimension n ae used when the embedding sequence is geneated by node 1, as shown in Figue 7. VI. CONCLUSIONS The poblem of embedding one inteconnection netwok into anothe is vey impotant in the aea of paallel computing fo potability of algoithms acoss vaious achitectues, layout of cicuits in VLSI, and mapping logical data stuctues into compute memoies. The impotance of tees comes fom the fact that this class of stuctues is useful in the solution of banded and spase systems, by diect elimination, and captues the essence of divide and conques algoithms. The impotant of cycles and ings comes fom the fact that it is the task gaph of many basic opeations in paallel computing. The hypecube is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability fo geneal pupose paallel pocessing. An attactive vesion of the hypecube is the cossed cube. It peseves many popeties of the hypecube and most impotantly educes the diamete by a facto of two. This pape has pesented diffeent schemes to show the ability of the cossed cube as a vesatile achitectue to simulate othe inteconnection netwoks efficiently. We pesent new schemes to embed complete binay tees, complete quad tees, and cycles into cossed cubes. A good poblem will be to impove the dilation on embedding tees into cossed

6 cubes. Anothe inteesting poblem is to genealize the schemes to embed tees and cycles in the pesence of faults (a) Using uppe links when ES initiated by (b) Using lowe links when ES initiated by 001. Figue 7: The ecusive constuction of the cycle C 2 n in a fault-fee envionment. REFERENCES [1] E. Abuelub, "The Hamiltonicity of Cossed Cubes in the Pesence of Faults," Engineeing Lettes, vol. 16, no. 3, pp , [2] L. Baasch, S. Lakshmivaahan, and S. Dhall, "Embedding Abitay Meshes and Complete Binay Tees in Genealized Hypecubes," Poceedings of the 1 st IEEE Symposium on Paallel and Distibuted Pocessing, pp , [3] A. Badea, M. Feixas, I. Boada, J. Rigau, and M. Sbet, "Medical Image Registation Based on BSP and Quad-Tee Patitioning", Poceedings of WBIR'2006, pp. 1-8, [4] C. Chang, T. Sung, and L. Hsu, "Edge Congestion and Topological Popeties of Cossed Cubes," IEEE Tansactions on Paallel and Distibuted Systems, vol. 11, no. 1, pp , [5] A. Dingle and I. Sudboough, "Simulating Binay Tees and X-Tees on Pyamid Netwoks," Poceedings of the 1 st IEEE Symposium on Paallel and Distibuted Pocessing, pp , [6] K. Efe, "The Cossed Cube Achitectue fo Paallel Computation," IEEE Tansactions on Paallel and Distibuted Systems, vol. 3, no. 5, pp , [7] A. El-Amaway and S. Latifi, "Popeties and Pefomance of Folded Hypecubes," IEEE Tansactions on Paallel and Distibuted Systems, vol. 2, no. 1, pp , [8] J. Fan, X. Lin, and X. Jia, "Non-Pancylicity and Edge-Pancyclicity of Cossed Cubes," Infomation Pocessing Lettes, vol. 93, no. 3, pp , [9] J. Fan, X. Lin, and X. Jia, "Optimal Path Embedding in Cossed Cubes," IEEE Tansactions on Paallel and Distibuted Systems, vol. 16, no. 12, pp , [10] J. Fu and G. Chen, "Hamiltonicity of the Hieachical Cubic Netwok," Theoy of Compute Systems, vol. 35, pp , [11] H. Keh and J. Lin, "On Fault-Toleance Embedding of Hamiltonian Cycles, Linea Aays, and Rings in a Flexible Hypecube," Paallel Computing, vol. 26, no. 6, pp , [12] S. Latifi and S. Zheng, "Optimal Simulation of Linea Aay and Ring Achitectues on Multiply-Twisted Hypecube," Poceedings of the 11 th Intenational IEEE Confeence on Computes and Communications, [13] S. Lee and H. Ho, "A 1.5 Appoximation Algoithm fo Embedding Hypeedges in a Cycle," IEEE Tansactions on Paallel and Distibuted Systems, vol. 16, no. 6, pp , June [14] T. Leighton, Intoduction to Paallel Algoithms and Achitectue: Aays, Tees, Hypecubes, Mogan Kaufmann, [15] J. Lin, "Embedding Hamiltonian Cycles, Linea Aays, and Rings in a Faulty Supecube," Intenational Jounal of High Speed Computing, vol. 11, no. 3, pp , [16] M. Ma and J. Xu, "Panconnectivity of Locally Twisted Cubes," Applied Mathematical Lettes, vol. 17, no. 7, pp , [17] T. Makas and J. Reif, "Quad Tee Stuctues fo Image Compession Applications", Infomation Pocessing Lettes, vol. 28, no. 6, pp , [18] F. Pepaata and J. Vuillemin, "The Cube-Connected Cycles: A Vesatile Netwok fo Paallel Computation," Communications of the ACM, vol. 24, no. 5, pp , [19] L. Topi, R. Paisi, and A. Uncini, "Spline Recuent Neual Netwok fo Quad-Tee Video Coding," Poceedings of WIRN'2002, pp , [20] Y. Saad and M. Schultz, "Topological Popeties of the Hypecube," IEEE Tansactions on Computes, vol. 37, no. 7, pp , July 1988, [21] L. Youyao, "A Hypecube-based Scalable Inteconnection Netwok fo Massively Paallel Computing," Jounal of Computes, vol. 3, no. 10, Octobe [22] Q. Zhu, J. Hou, and M. Xu, "On Reliability of the Folded Hypecubes," Infomation Science, vol. 177, no. 8, pp , 2008.

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Annales UMCS Informatica AI 2 (2004) UMCS

Annales UMCS Informatica AI 2 (2004) UMCS Pobane z czasopisma Annales AI- Infomatica http://ai.annales.umcs.pl Annales Infomatica AI 2 (2004) 33-340 Annales Infomatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Embedding as a

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

arxiv: v4 [cs.ds] 7 Feb 2018

arxiv: v4 [cs.ds] 7 Feb 2018 Dynamic DFS in Undiected Gaphs: beaking the O(m) baie Suende Baswana Sheejit Ray Chaudhuy Keeti Choudhay Shahbaz Khan axiv:1502.02481v4 [cs.ds] 7 Feb 2018 Depth fist seach (DFS) tee is a fundamental data

More information

FACE VECTORS OF FLAG COMPLEXES

FACE VECTORS OF FLAG COMPLEXES FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

Also available at ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010)

Also available at  ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) Also available at http://amc.imfm.si ISSN 1855-3966 (pinted edn.), ISSN 1855-3974 (electonic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) 109 120 Fulleene patches I Jack E. Gave Syacuse Univesity, Depatment

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

ART GALLERIES WITH INTERIOR WALLS. March 1998

ART GALLERIES WITH INTERIOR WALLS. March 1998 ART GALLERIES WITH INTERIOR WALLS Andé Kündgen Mach 1998 Abstact. Conside an at galley fomed by a polygon on n vetices with m pais of vetices joined by inteio diagonals, the inteio walls. Each inteio wall

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat

More information

DUe to the recent developments of gigantic social networks

DUe to the recent developments of gigantic social networks Exploing Communities in Lage Pofiled Gaphs Yankai Chen, Yixiang Fang, Reynold Cheng Membe, IEEE, Yun Li, Xiaojun Chen, Jie Zhang 1 Abstact Given a gaph G and a vetex q G, the community seach (CS) poblem

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

Lecture 27: Voronoi Diagrams

Lecture 27: Voronoi Diagrams We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the

More information

The Hamiltonicity of Crossed Cubes in the Presence of Faults

The Hamiltonicity of Crossed Cubes in the Presence of Faults The Hamiltonicity of Crossed Cubes in the Presence of Faults E. Abuelrub, Member, IAENG Abstract The crossed cube is considered as one of the most promising variations of the hypercube topology, due to

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

Parallel processing model for XML parsing

Parallel processing model for XML parsing Recent Reseaches in Communications, Signals and nfomation Technology Paallel pocessing model fo XML pasing ADRANA GEORGEVA Fac. Applied Mathematics and nfomatics Technical Univesity of Sofia, TU-Sofia

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Clustering Interval-valued Data Using an Overlapped Interval Divergence

Clustering Interval-valued Data Using an Overlapped Interval Divergence Poc. of the 8th Austalasian Data Mining Confeence (AusDM'9) Clusteing Inteval-valued Data Using an Ovelapped Inteval Divegence Yongli Ren Yu-Hsn Liu Jia Rong Robet Dew School of Infomation Engineeing,

More information

An Optimised Density Based Clustering Algorithm

An Optimised Density Based Clustering Algorithm Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,

More information

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation A Minutiae-based Fingepint Matching Algoithm Using Phase Coelation Autho Chen, Weiping, Gao, Yongsheng Published 2007 Confeence Title Digital Image Computing: Techniques and Applications DOI https://doi.og/10.1109/dicta.2007.4426801

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces A Family of Distibuted Deadlock Avoidance Potocols and thei Reachable State Spaces Césa Sánchez, Henny B. Sipma, and Zoha Manna Compute Science Depatment Stanfod Univesity, Stanfod, CA 94305-9025 {cesa,sipma,manna}@cs.stanfod.edu

More information

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio

More information

High performance CUDA based CNN image processor

High performance CUDA based CNN image processor High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1 Impovement of Fist-ode Takagi-Sugeno Models Using Local Unifom B-splines Felipe Fenández, Julio Gutiéez, Gacián Tiviño and Juan Calos Cespo Dep. Tecnología Fotónica, Facultad de Infomática Univesidad Politécnica

More information

An Assessment of the Efficiency of Close-Range Photogrammetry for Developing a Photo-Based Scanning Systeminthe Shams Tabrizi Minaret in Khoy City

An Assessment of the Efficiency of Close-Range Photogrammetry for Developing a Photo-Based Scanning Systeminthe Shams Tabrizi Minaret in Khoy City Austalian Jounal of Basic and Applied Sciences, 5(1): 80-85, 011 ISSN 1991-8178 An Assessment of the Efficiency of Close-Range Photogammety fo Developing a Photo-Based Scanning Systeminthe Shams Tabizi

More information

Signal integrity analysis and physically based circuit extraction of a mounted

Signal integrity analysis and physically based circuit extraction of a mounted emc design & softwae Signal integity analysis and physically based cicuit extaction of a mounted SMA connecto A poposed geneal appoach is given fo the definition of an equivalent cicuit with SMAs mounted

More information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220

More information

Improved Fourier-transform profilometry

Improved Fourier-transform profilometry Impoved Fouie-tansfom pofilomety Xianfu Mao, Wenjing Chen, and Xianyu Su An impoved optical geomety of the pojected-finge pofilomety technique, in which the exit pupil of the pojecting lens and the entance

More information

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number. Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

The Reconfigurable Mesh: Programming Model, Self-Simulation, Adaptability, Optimality, and Applications Mohammad Manzur Murshed

The Reconfigurable Mesh: Programming Model, Self-Simulation, Adaptability, Optimality, and Applications Mohammad Manzur Murshed The Reconfiguable Mesh: Pogamming Model, Self-Simulation, Adaptability, Optimality, and Applications Mohammad Manzu Mushed A thesis submitted fo the degee of Docto of Philosophy at The Austalian National

More information

DAG-BASED VISUAL INTERFACES FOR NAVIGATION IN INDEXED VIDEO CONTENT 1

DAG-BASED VISUAL INTERFACES FOR NAVIGATION IN INDEXED VIDEO CONTENT 1 DAG-BASED VISUAL INTERFACES FOR NAVIGATION IN INDEXED VIDEO CONTENT 1 Maylis DELEST, Anthony DON, Jenny BENOIS-PINEAU LaBRI CNRS UMR 5800/Univesité Bodeaux 1 {jenny.benois,maylis,don}@labi.f ABSTRACT Indexing

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

ANN Models for Coplanar Strip Line Analysis and Synthesis

ANN Models for Coplanar Strip Line Analysis and Synthesis 200 IJCSNS Intenational Jounal of Compute Science and Netwok Secuity, VOL.8 No.10, Octobe 2008 Models fo Coplana Stip Line Analysis and J.Lakshmi Naayana D.K.Si Rama Kishna D.L.Patap Reddy Chalapathi Institute

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING

INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING INDEXATION OF WEB PAGES BASED ON THEIR VISUAL RENDERING Emmanuel Buno Univesité du Sud Toulon-Va / LSIS CNRS BP 20132, F-83957 La Gade buno@univ-tln.f Nicolas Faessel LSIS CNRS Domaine Univesitaie de Saint-Jéôme

More information

Intuitionistic Fuzzy Soft N-ideals

Intuitionistic Fuzzy Soft N-ideals Intenational Jounal of Fuzzy Mathematics and Systems. ISSN 2248-9940 Volume 3, Numbe 4 (2013), pp. 259-267 Reseach India Publications http://www.ipublication.com Intuitionistic Fuzzy Soft N-ideals A. Solaiaju

More information

Finding Repeats With Fixed Gap

Finding Repeats With Fixed Gap Finding Repeats With Fixed Gap Roman Kolpakov, Gégoy Kucheov To cite this vesion: Roman Kolpakov, Gégoy Kucheov Finding Repeats With Fixed Gap 7th Intenational Symposium on Sting Pocessing Infomation Retieval

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

Secure Collaboration in Mediator-Free Environments

Secure Collaboration in Mediator-Free Environments Secue Collaboation in Mediato-Fee Envionments Mohamed Shehab School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA shehab@pudueedu Elisa Betino Depatment of Compute Sciences

More information

Quality Aware Privacy Protection for Location-based Services

Quality Aware Privacy Protection for Location-based Services In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,

More information

User Group testing report

User Group testing report Use Goup testing epot Deliveable No: D6.10 Contact No: Integated Poject No. 506723: SafetyNet Aconym: SafetyNet Title: Building the Euopean Road Safety Obsevatoy Integated Poject, Thematic Pioity 6.2 Sustainable

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

Bo Gu and Xiaoyan Hong*

Bo Gu and Xiaoyan Hong* Int. J. Ad Hoc and Ubiquitous Computing, Vol. 11, Nos. /3, 1 169 Tansition phase of connectivity fo wieless netwoks with gowing pocess Bo Gu and Xiaoyan Hong* Depatment of Compute Science, Univesity of

More information

Binary Dissection: Variants & Applications

Binary Dissection: Variants & Applications Binay Dissection: Vaiants & Applications Shahid H. Bokhai Depatment of Electical Engineeing Univesity of Engineeing & Technology Lahoe, Pakistan Thomas W. Cockett ICASE NASA Langley Reseach Cente Hampton,

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking Cyptanalysis of Hwang-Chang s a Time-Stamp Potocol fo Digital Watemaking *Jue-Sam Chou, Yalin Chen 2, Chung-Ju Chan 3 Depatment of Infomation Management, Nanhua Univesity Chiayi 622 Taiwan, R.O.C *: coesponding

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

Cellular Neural Network Based PTV

Cellular Neural Network Based PTV 3th Int Symp on Applications of Lase Techniques to Fluid Mechanics Lisbon, Potugal, 6-9 June, 006 Cellula Neual Netwok Based PT Kazuo Ohmi, Achyut Sapkota : Depatment of Infomation Systems Engineeing,

More information

Analysis of Wired Short Cuts in Wireless Sensor Networks

Analysis of Wired Short Cuts in Wireless Sensor Networks Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment

More information

Efficient Maximal Poisson-Disk Sampling

Efficient Maximal Poisson-Disk Sampling Efficient Maximal Poisson-Disk Sampling Mohamed S. Ebeida Sandia National Laboatoies Andew A. Davidson Univesity of Califonia, Davis Anjul Patney Univesity of Califonia, Davis Patick M. Knupp Sandia National

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

Reachable State Spaces of Distributed Deadlock Avoidance Protocols

Reachable State Spaces of Distributed Deadlock Avoidance Protocols Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

Prof. Feng Liu. Fall /17/2016

Prof. Feng Liu. Fall /17/2016 Pof. Feng Liu Fall 26 http://www.cs.pdx.edu/~fliu/couses/cs447/ /7/26 Last time Compositing NPR 3D Gaphics Toolkits Tansfomations 2 Today 3D Tansfomations The Viewing Pipeline Mid-tem: in class, Nov. 2

More information

Hierarchical Peer-to-peer Systems

Hierarchical Peer-to-peer Systems Hieachical Pee-to-pee ystems L. Gacés-Eice 1, E.W. Biesack 1, P.A. Felbe 1, K.W. Ross 2, and G. Uvoy-Kelle 1 1 Institut EURECOM 06904 ophia Antipolis, Fance {gaces ebi felbe uvoy}@euecom.f 2 Polytechnic

More information

UNION FIND. naïve linking link-by-size link-by-rank path compression link-by-rank with path compression context. An Improved Equivalence Algorithm

UNION FIND. naïve linking link-by-size link-by-rank path compression link-by-rank with path compression context. An Improved Equivalence Algorithm Disjoint-sets data type Lectue slides by Kevin Wayne Copyight 5 Peason-Addison Wesley http://www.cs.pinceton.edu/~wayne/kleinbeg-tados UNION FIND naïve linking link-by-size link-by-ank path compession

More information

Class 21. N -body Techniques, Part 4

Class 21. N -body Techniques, Part 4 Class. N -body Techniques, Pat Tee Codes Efficiency can be inceased by gouping paticles togethe: Neaest paticles exet geatest foces diect summation. Distant paticles exet smallest foces teat in goups.

More information

4.2. Co-terminal and Related Angles. Investigate

4.2. Co-terminal and Related Angles. Investigate .2 Co-teminal and Related Angles Tigonometic atios can be used to model quantities such as

More information

Strongly Connected Components. Uses for SCC s. Two Simple SCC Algorithms. Directed Acyclic Graphs

Strongly Connected Components. Uses for SCC s. Two Simple SCC Algorithms. Directed Acyclic Graphs CSE Intoduction to Algoithms Depth Fist Seach and Stongly Connected Components W.L. Ruzzo, Summe 00 Undiected Depth-Fist Seach It s not just fo tees DFS() back edge tee edge if maked then etun; mak ; #

More information

Automatically Testing Interacting Software Components

Automatically Testing Interacting Software Components Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt

More information