Asynchronous Power Flow on Graphic Processing Units

Size: px
Start display at page:

Download "Asynchronous Power Flow on Graphic Processing Units"

Transcription

1 1 Asyncronous Power Flow on Grapic Processing Units Manuel Marin, Student Member, IEEE, David Defour, and Federico Milano, Senior Member, IEEE Abstract Asyncronous iterations can be used to implement fixed-point metods suc as Jacobi and Gauss-Seidel on parallel computers wit ig syncronization costs. However, tey are rarely considered in practice due to te low convergence rate. Tis paper describes an implementation on GPUs of a novel Power Flow analysis model using asyncronous iterations. We present our model for te solution of te Power Flow analysis problem, prove its convergence and evaluate its performance for a GPU execution. Index Terms Asyncronous iterations, fixed-point metod, power flow analysis, grapic processing units. I. INTRODUCTION Power Flow (PF) analysis refers to te steady-state analysis of AC power networks, widely used in several applications for power system operation and planning [1]. Traditional PF analysis tools rely on matrix factorization using igly optimized serial direct solvers [2], [3], [4]. More recently, a parallel-friendly PF analysis tool as also been introduced, based on an analogical representation of te system [5]. Te real power system is mapped onto a CMOS integrated circuit, wic allows one to pysically simulate te system at a muc iger frequency. Te efficiency of tis approac is linked wit te intrinsic parallelism of te pysical system, were every element of te network is acting simultaneously. Te main drawback is te lack of flexibility since for every system tat one wants to simulate, a new analog model as to be built. In tis paper we present a software implementation of te same idea presented in [5], so tat any arbitrary system can be analyzed witout extra effort. Tis allows us to propose an intrinsically parallel PF analysis model. Our approac is based on fixed-point iterations performed individually for every element in te system. Results of succesive updates are excanged until an equilibrium point is reaced, as in te concept of team algoritms [6], [7]. Te approac is well-suited for parallel implementation using asyncronous iterations, wic ave also been applied to te network flow problem [8], [9]. Te main reason wy asyncronous iterations are not usually preferred over syncronous ones is tat (i) tey require stronger assumptions in order to converge, and (ii) convergence rate is smaller. However, massively parallel computing environments can benefit from te asyncronous approac M. Marin is wit Université de Liège, Institut Montefiore, Liège, Belgium ( mmarin@ulg.ac.be). D. Defour is wit Université de Perpignan Via Domitia, DALI and Université Montpellier 2, LIRMM, France ( david.defour@univ-perp.fr). F. Milano is wit te Scool of Electrical, Electronic and Communications Engineering of te University College Dublin, Dublin, Ireland ( federico.milano@ucd.ie). wenever te cost of syncronization becomes too ig. For instance, in te Grapic Processing Unit (GPU) explicit syncronization between treads from different Streaming Multiprocessors is only acievable troug te ost processor, wic drastically reduces performance. In order to target GPU arcitectures, we study convergence properties of our model and provide a proof of convergence. Te remainder of te paper is organized as follows. Section II introduces fixed-point iterations and presents several alternatives for parallel implementation, including syncronous, asyncronous and partially asyncronous frameworks. In Section III, te proposed intrinsically parallel metod for PF analysis is presented and its convergence properties are studied. Section IV describes te implementation and evaluation of te proposed metod on a set of bencmarks as well as comparisons wit existing approaces. Finally, Section V draws conclusions and outlines future work. II. FIXED-POINT ITERATIONS ON A PARALLEL COMPUTER Let us first recall te concept of fixed-point iterations defined as follows. Definition 1 (Fixed-point iteration). Let f: R n R n and x R n. Ten, x is a fixed-point of f( ) if and only if x = f(x). Furtermore, let x (0) R n. Ten, te iteration given by: x (k+1) = f(x (k) ), k = 0,1,..., (1) is called a fixed-point iteration on f( ). Examples of fixed-point iterations are te Jacobi and Gauss- Seidel metods [1]. Fixed-point iterations can be implemented in parallel by splitting te set of input element among treads. Eac tread updates its respective elements and communicates its results to oters wit or witout syncronization. A. Syncronous iterations Wit syncronous iterations, all te elements are updated by block before te process moves as a wole into te next step. Te above requires to place a syncronization point at te end of eac iteration. As a consequence, treads tat finis teir updates earlier are forced to wait for te oters to catc up. Te reason for treads aving different processing times are various. Some of tem may be intrinsic to te algoritm, e.g., irregular memory access patterns, load imbalance. Some oters may be related to te arcitecture, e.g., differences in processor frequency, communication network constraints [10].

2 2 B. Asyncronous iterations An alternative to te syncronous approac is te so-called asyncronous iteration, were individual treads do not wait for oters and simply go aead wit teir work. Tis means tat at every asyncronous iteration only a subset of te elements are updated. No syncronization point is explicitly added to te program. As a consequence, some of te updates may be computed wit data from several iterations back. An asyncronous iteration is defined in terms of an update function and a delay function. Te update function, notedu( ), receives te iteration counter k N, and returns a subset of {1,...,n} indicating te list of treads tat update teir elements at iteration k. Te delay function, noted d( ), receives te indices i,j {1,...,n} and te iteration counter k N, and returns te delay of tread j wit respect to tread i at iteration k. Tis delay represents te number of iterations performed since te value of x j was last made visible to i. Definition 2 (Asyncronous iteration). Let x R n and f: R n R n. For k N,i,j {1,...,n}, let U(k) {1,...,n} and d(i,j,k) N 0, suc tat x (k+1) i = d(i,j,k) 0, i,j,k, (2a) lim d(i,j,k) <, k i,j, (2b) {k: i U(k)} =, i. (2c) In addition, let x (0) R n. Ten, te iteration defined by: { f i (x (k d(i,1,k)) x (k) i 1,...,x (k d(i,n,k)) n ) if i U(k), if i U(k), (3) is called an asyncronous iteration on f( ), wit update function U( ) and delay function d( ). Assumptions in (2a), (2b) and (2c) ensure tat te process is well defined. Specifically, te assumption in (2a) states tat only values computed in previous iterations are used in any update. Te one in (2b) states tat newer values of te elements are eventually used. Finally, te assumption in (2c) states tat no element ceases to be updated during te course of te iteration. In practical terms, if te updates are made visible as soon as tey are computed, ten te tird assumption implies te second. Tis is te case, for example, of an application tat uses GPU global memory to store te data. Note tat a syncronous iteration is a special case of asyncronous iteration wit U(k) = {1,...,n} and d(i,j,k) = 0, for all i, j, k. Due to te peculiarities introduced above, asyncronous iterations converge differently from syncronous ones. Te following result considers te case of a linear application. Teorem 1 (Necessary and sufficient condition for convergence of linear asyncronous iterations [11]). Let f: R n R n, given by, f(x) = Lx+b, (4) were L R n n, and b R n. Let L denote te matrix of absolute values of te entries of L, and ρ( L ) its spectral radius. If ρ( L ) < 1, (5) ten any asyncronous iteration on f( ) converges to x, te unique fixed-point of f( ), regardless of te selection of U( ), d( ) and x (0). Furtermore, if ρ( L ) 1, ten tere exists U( ), d( ) and x (0) suc tat te associated asyncronous iteration does not converge to x. Proof. See [11]. C. Partially asyncronous iterations In some circumstances, convergence of asyncronous iterations can be facilitated by making treads syncronize every once in a wile. Definition 3 (Partially asyncronous iteration). Consider Definition 2 of an asyncronous iteration. Replace assumptions in (2b) and (2c) by te following: d N: d(i,j,k) d, i,j,k, (6a) s N: i s s=1 U(k +s), i,k. (6b) d(i,i,k) = 0, i,k, (6c) Ten, te iteration given by equation (3) is now termed a partially asyncronous iteration. Te assumption in (6a) establises tat not only newer values of te vector elements are eventually used, but eac of tese values is used before d iterations ave passed from teir calculation. Te assumption in (6b), in turn, states tat eac element is updated at least once in every s consecutive iterations. Finally, te assumption in (6c) establises tat every element is updated using its own last calculated value. In practical terms, te first two assumptions can be met by performing a syncronization step every l iterations, were l is te minimum of d and s. Te tird assumption can be met by aving eac element assigned to only one tread. As mentioned above, partially asyncronous iterations converge more easily tan totally asyncronous ones. Te following result establises a convergence criteria in te linear case, wit softer assumptions tan te ones in Teorem 1. Teorem 2 (Sufficient condition for convergence of linear partially asyncronous iterations [12]). Let f: R n R n, given by, f(x) = Lx+b, (7) were L R n n, and b R n. Let g: R n R n, given by: were α (0,1). If L = (l ij ) is irreducible and g(x) = (1 α)x+αf(x), (8) n l ij 1, i, (9) j=1 ten any partially asyncronous iteration on g( ) converges to x, fixed-point of f( ). Proof. See [12].

3 3 In [13], te autors presented a special case in wic convergence occurs for α = 1, at a linear (geometric) rate. Tey also determined a lower bound for te average convergence rate (per iteration) in te long-term, τ, as follows: wit τ (1 σ r ) 1/r, (10) r = 1+ d+(n 1)( s+ d), (11a) ( ) + x i σ = min l ij i,j x, (11b) j were min + ( ) refers to te minimum of te positive elements. Tis means tat te error is scaled at most by a factor of (1 σ r ) 1/r in any average iteration. As σ is always lower tan 1, te convergence rate approaces 1 for increasing values of n, d and s. Tat is to say, te convergence becomes sublinear. For illustration purposes, consider tat d = s = 0 (syncronous iteration). In tis case, r = 1 and τ = 1 σ. In oter words, te convergence rate is unaffected by te problem size n and only depends on σ. Now consider tat d = s = 1. Tis corresponds to a partially asyncronous iteration wit a syncronization step every oter iteration. In tis case, r = 2n, wic means tat convergence slows down as te problem grows. Figure 1 sows te lower bound on te convergence rate as a function of te problem size n. Te different curves represent different values of σ. Observe tat, unless σ is very ig, convergence becomes sub-linear very quickly. Rate of convergence, τ Problem size, n σ = 0.1 σ = 0.5 σ = 0.9 Fig. 1. Bound on te convergence rate as a function of te problem size, for different values of te parameter σ. Tis migt be a strong reason to prefer te syncronous approac over te partially asyncronous. However, te partially asyncronous approac can be a valid alternative in some cases, e.g., if te costs of syncronization are relatively ig, or wen te number of iterations required to converge is relatively low. III. PROPOSED METHOD FOR AC CIRCUIT ANALYSIS Tis section presents ow to perform PF analysis based on partially asyncronous iterations. Te metod is designed to be implemented on Single Instruction Multiple Tread (SIMT) arcitectures suc as GPUs, by exploiting regularity. Te metod is presented troug a top-down approac. Te network model is described first, specifying ow te different parts communicate and interact. Next, te models of te different elements tat compose te power system are specified in teir atomic beaviour. Finally, te convergence properties of te proposed metod are studied. A. Network model Te proposed metodology distinguises two fundamental units in te power system: components and nodes. Te components are te electrical devices, and te nodes are te points of interconnection. For sake of simplicity and also to facilitate illustration of te metod, te following tree assumptions are made: 1) Only dipole components, i.e., components connected to two nodes, are present. 2) Tere is no more tan one component connected between any two nodes. 3) Every node is connected to at least two components. Te circuit is well defined if tere are components connecting all te nodes in a closed pat. Node in te circuit is noted n. Te component connected between n and n m is noted c m. Te set of all nodes in te circuit is noted N, and te set of components, C. In addition, a set of influencers, I N, is defined for eac non-ground node n N. Tis set contains all te nodes separated from n by exactly one component. Tese are also known as te fanin nodes [14]. For illustration purposes, consider te circuit in Fig. 2. In tis case, N = {n 0,n 1,n 2,n 3 } and C = {c 01,c 12,c 02,c 23,c 03 }. Te circuit is well defined, since c 01, c 12, c 23 and c 03 connect all te nodes in a closed pat. In addition, I 1 = {n 0,n 2 }, I 2 = {n 0,n 1,n 3 }, and I 3 = {n 0,n 2 }. n 1 n 2 n 3 c 01 c 12 Fig. 2. Example 4-node circuit. n 0 c 02 In te proposed metodology, Ú denotes te voltage at node n, and Ùm denotes te voltage at node n according to component c m. Te two are different during te course of te iteration, and become equal at convergence. In addition, m denotes te power injected to n by component c m, and denotes te power mismatc at n. c 23 c 03 At every iteration k, a component c m obtains Ú (k) from node n, and returns Ù (k) m and (k) m and to it. A

4 4 similar excange occurs wit node n m at te oter end of te component. Next, at te same iteration k, node n receives Ù (k) j and j from eac component c j connected to it, and returns Ú (k+1) and (k+1) to all of tem. Ten, te process moves into a next iteration. Figure 3 illustrates te above for component c 12 and node n 2 in te example 4-node circuit. n 0 n 1 n 3 Ú1, 1 Ù12 Ù21 n 1 c 12 n c 02 c 12 c 23 (a) (b) Ù20 20 Ù21 21 Ù23 23 Ú2, 2 Fig. 3. Network model: (a) Component; and (b) Node. B. Component and node models n 2 Ú2 2 1) Component model: For te purposes of te proposed metod, only tree types of component are required: te generator, te branc and te sunt. Te use of a universal model improves instruction regularity of te GPU implementation, as discussed in Section IV. Te impedance of component c m is noted z m. a) Generator: It is connected between te ground and one node, say n. Te generator is tere to ensure tat te reactive power mismatc at te node is equal to zero. In tis sense, te model assumes tat generators are able to provide as muc reactive power as needed in order to maintain te voltage. Te slack generator also does te same for real power. Accordingly, te iteration is te following: for nonslack generators, And for te slack generator, Im( ) = 0. (12) = 0. (13) b) Branc: It is connected between two non-ground nodes, say n and n m. It consists of a constant impedance, z m. Te branc iteration is defined as follows: Ù (k) m = Ú(k) +z m m = Ú(k) ( Ú (k) ( Ú (k) m Ú (k) z m ), (14a) ). (14b) c) Sunt: It is connected between te ground and one node, say n. It represents an impedance to ground, noted z 0 (te subscript 0 indicates te ground). Te sunt iteration is similar to te branc one. Te main difference is tat Úm in equation (14b) is replaced by zero (te ground voltage). Te iteration is te following: Ù (k) 0 = Ú(k) +z 0 (k) 2 ( ), (15a) Ú (k) 0 = Ú (z m ), (15b) were indicates te absolute value. Tese equations are obtained by applying te Om Law on component c m, and te Kircoff Current Law on node n. Note tat if te power mismatc at n is equal to zero (i.e., = 0), ten Ù (k) m = Ú(k). Tat is to say, te voltage according to component c m is te same as te one according to node n itself. Tis corresponds to a condition of convergence at component level. 2) Node model: Te node is simply modelled as a point were different components excange data and consolidate teir results. Te node iteration is defined as follows: Ú (k+1) (k+1) = m I w m Ù (k) m, = m I m, (16a) (16b) were w m is defined as te weigt of component c m witin node n. Tese weigts satisfy m I w m = 1. (17) In oter words, te voltage at eac node is updated wit te weigted sum of te voltages computed by eac component connected to it. Note tat if convergence is attained at component level (i.e., Ù (k) m = Ú(k), m I ), ten Ú (k+1) = Ú (k). Tis appens wen all te components agree on te value of te node voltage, and corresponds to a condition of convergence at node level. A second node iteration is added to allow PQ loads to become constant impedances, if te voltage at te node is outside specific limits. Tis is a tecnique used in traditional PF analysis [1]. In te proposed metod, te power injected to n by loads is noted L,. If te voltage is outside te limits, tis variable is scaled by a factor depending on te current voltage and te violated limit. Ten, te power mismatc at te node is adjusted to reflect te cange in te load. In conclusion, te iteration is composed of two parts. Te first updates te power injected by loads, as follows: ( ) 2 v (k) v min L, if v (k) < v min, (k+1) ( ) 2 L, = v (k) v max L, if v (k) > v max (18), oterwise, L,

5 5 were v min and v max are te voltage limits at n. Ten, te second part updates te power mismatc, as follows: (k+1) = (k) L, + (k+1) L,. (19) Te use of te above iteration reduces instruction regularity, as it needs to be performed only by nodes. However, it may be required for convergence of te metod and involves a limited number of operations wic can be acceptable in a SIMT execution context. C. Convergence study Tis section investigates te convergence properties of te proposed iterative metod for two different syncronization scemes. Let n 0 be te ground-node, and N te set of all nodes in te circuit minus te ground. Tat is to say, N = N \{n 0 }. Also, let Ú C n 1 be te vector of voltages at all non-ground nodes. Te iteration function, : C n 1 C n 1, is given by: (Ú) = Ú + m I j I w m z m Új Ú z j, N. (20) Tis expression is obtained by combining equations (14a), (14b), (16a), (16b) and (17). Equation (20) is linear, tus, it can be written as follows: (Ú) = LÚ, (21) were L is given by: l = 1 w mz m, z j m I j I w mz m z j if j I, l j = m I 0 oterwise. (22) However, one can notice tat a totally asyncronous iteration on f( ), as given by (21), is not guaranteed to converge. Tis is linked wit te fact tat te sum of te elements in any row of L, were L is given by (22), is equal to 1, ten 1 is an eigenvalue of L and ρ(l) 1. Since for every matrix A, ρ( A ) ρ(a), ten ρ( L ) 1. Tis implies tat to ensure convergence of te proposed iteration, furter assumptions are needed. Te following teorem establises a sufficient condition for convergence based on partially asyncronous iterations. Teorem 3. Let ( ) defined by (Ú) = (1 α)ú+α (Ú), were 0 < α < 1 and ( ) given by (20). Let te weigts, w m,m I, satisfy te following: 1 0,. (23) z j m I j I w mz m Ten, any partially asyncronous iteration over ( ) converges to Ú, fixed-point of ( ). Proof. See [15]. IV. CASE STUDY Te proposed metod for PF analysis as been tested on te Nvidia Kepler GPU arcitecture [16]. It as been evaluated on a series of bencmarks, wit te aim of exploring convergence, performance and scalability issues. A. Implementation Regularity is one of te most powerful leverages for GPU performance [17]. Algoritm 1 presents a regular implementation of te proposed metod. In order to ensure asyncronous evaluation of eac component, we set te number of blocks to be smaller tat te number of blocks tat can be andled in parallel by te ardware. Terefore all treads are continuously running until convergence of te system. Treads are andling te set of components in a round-robin manner, wic leads to a similar amount of work per tread as components are always connected to eiter one or two nodes. If treads were assigned to nodes instead, ten some treads would perform muc more work tan oters, as nodes can be connected to any number of components. Instructions 5 and 6 calculate te voltage at its component s terminals and updates te appropriate coordinates on vector Ú. Instructions 7 and 8 calculate te power injections at eac terminal and updates te appropriate coordinates on vector. Te process is repeated after syncronizing all treads, until convergence is reaced. Algoritm 1 Intrinsically parallel algoritm for PF analysis. Input: Vector of initial power mismatces, ; component model parameters; tolerance for te error, ǫ, maximum number of asyncronous iterations, K. Output: Vector of node voltages, Ú. 1: Ú = 1 0 # Initial guess 2: for all,m: c m C in parallel do 3: k = 0 4: repeat 5: calculate Ùm and Ùm 6: update Ú and Úm 7: calculate m and m 8: update and m 9: k k +1 10: if k > K ten 11: syncronize treads 12: k = 0 13: until, m < ǫ As discussed in [18], coalesced global memory accesses can drastically improve GPU performance by reducing te number of memory transactions. In te proposed implementation, te above is acieved by using a structure of arrays approac. In addition, performance can benefit of sared memory for recurrent memory operations. However, sared memory is only accessible to treads witin one tread-block, wereas global memory is accessible to all treads. Accordingly, using sared memory in te proposed metod increases te delay between treads, wic affects convergence as discussed in Section III-C. Te point were sared memory usage brings

6 6 performance improvement is igly dependent of te problem parameters and setting tis point could benefit from previous researc conducted on flexible communication [19]. B. Evaluation Te implementation is evaluated using randomly generated bencmarks from 1,024 to 8,192 nodes, wic correspond to real size networks. Te bencmarks are obtained using te random radial network generator provided by Dome [3]. We used a Xeon E5645 CPU, wit 12 cores at 2.4Gz (1 used), a Tesla K40c, wit cores at 0.7 Gz and a GeForce GTX 680 wit cores at 1.06Gz. All source code is compiled using G and CUDA ) Convergence: As discussed in Section II-C, partially asyncronous fixed-point iterations typically exibit a sublinear rate of convergence. Tis means tat reducing te convergence tolerance below a small tresold may require a large number of iterations. Figure 4 illustrates te relation between te convergence error and te number of iterations for te proposed metod using te K40c GPU. It sows te mismatc (on a logaritmic scale) as a function of te maximum number of iterations performed by any component. Te different curves represent different problem sizes. Note tat te beaviour is very similar on all 6 bencmarks, suggesting tat convergence is independent from te problem size. However, te convergence rate for tis experiment depends on te targeted accuracy. For example, reducing te error from 10 3 to 10 4 requires about 555 iterations in average. Tis corresponds to a convergence rate of Te convergence rate as an asymptotic limit of 1 wen te targeted accuracy is increasing wic is coerent wit te teoretical study of Section II-C, Te farter te metod is from te exact solution, te faster it approaces tat solution. Tis is te opposite of te Newton-Rapson (NR) metod were te convergence rate is improving at eac iteration. From tis point of view, it may be interesting to combine bot approaces into a ybrid solution tat switces metods depending on te error. For example, te proposed metod can be used to obtain a first solution fast, and te NR metod can be used to improve tat solution afterwards. 2) Performance: We compared te performance of te proposed approac wit serial NR provided by Dome [3]. Te Dome s implementation uses KLU, a igly optimized library for sparse matrix factorization, particularly suited to deal wit matrices from circuit analysis [20]. Te proposed metod is tested on te Tesla K40c GPU, and te NR on te Xeon E5645 CPU. Figure 5 sows te execution time of bot metods (on a logaritmic scale) as a function of te problem size, n, for a targeted error of Te NR execution time grows exponentially wit te problem size, wic is consistent wit precedent results [1]. In te proposed metod, in turn, te execution time seems less affected by te size, and exibits a more flat profile. At about 3,000 nodes, tere is a turning point in wic te proposed metod becomes faster tan NR. Tis turning point is dependent of many parameters (arcitecture, Numerical error e-05 1e Number of iterations n = 3072 n = 4096 n = 5120 n = 6144 n = 7168 n = 8192 Fig. 4. Numerical error as a function of te number of iterations on te K40c GPU. Simulation time (s) Fig ) Problem size (n) KLU N-R Prop. metod Related performance of N-R and te proposed metod (accuracy: implementation, topology,...) and it is expected to evolve favorably for te proposed metod as te number of embeded cores per cip is increasing. 3) Scalability: As mentioned in Section I, performance of asyncronous metods sould increase wit te number of computing cores. Te above is confirmed by Fig. 6, wic sows te execution time of te proposed asyncronous metod on two Nvidia Kepler GPU arcitectures as a function of te problem size. Te Tesla K40c GPU, embedding 2,880 computing cores, allows for a performance gain of about 1.3 over te GTX 680, embedding 1,536 cores. Tis means tat te proposed metod almost acieve strong scalability. Fig. 7 represents te number of iterations needed to converge as a function of te number of blocks launced. We compared te syncronous version (tat syncronizes treads after eac iteration), wit te asyncronous one (tat does not perform any syncronization at all). We observe tat only te latter benefits from increasing number of tread-blocks. Moreover, we see a turning point in wic performance does not improve and rater decays as te number of blocks keeps growing.

7 7 Simulation time (s) Problem size (n) GTX 680 Tesla K40c Fig. 6. Related performance of te proposed metod on two GPU arcitectures. Number of iterations Number of blocks Sync. Async. Fig. 7. Related performance of syncronous and asyncronous metod. V. CONCLUSIONS Tis paper presents a partially asyncronous fixed-point metod for PF analysis. Te metod is designed to be implemented on SIMT arcitectures suc as te GPU. A teoretical result is provided wic sows tat te metod is guaranted to converge, altoug convergence is generally sub-linear. Simulation results sow tat: (i) te convergence rate of te proposed metod tends to be better at an early stage, wic makes it a good complement of te traditional NR metod; (ii) te proposed metod becomes faster tan te traditional NR approac for problems of considerable size; (iii) te proposed metod scales well wit te number of computing cores in te GPU arcitecture. Future works will consider te improvement of te proposed CUDA implementation. In particular, te use of sared memory will be investigated. Tis addressing convergence of te metod in te case were an increasing number of iterations are performed asyncronously, i.e., witout communicating te results to all treads. [2] P. Simulator, Version 10.0 scopf, PVQV, PowerWorld Corporation, Campaign, IL, vol , [3] F. Milano, A pyton-based software tool for power system analysis, in IEEE Power and Energy Society General Meeting, 2013, pp [4] M. Simulink and M. Natick, Te matworks, [5] I. Nagel, Analog microelectronic emulation for dynamic power system computation, P.D. dissertation, École Polytecnique Fédérale de Lausanne, [6] S. Talukdar, S. Pyo, and R. Merotra, Designing algoritms and assignments for distributed processing. Electric Power Researc Institute, [7] J. Tsitsiklis, Problems in decentralized decision making and computation. DTIC Document, Tec. Rep., [8] D. Bertsekas and D. El Baz, Distributed asyncronous relaxation metods for convex network flow problems, SIAM Journal on Control and Optimization, vol. 25, no. 1, pp , [9] D. El Baz, P. Spiteri, J.-C. Miellou, and D. Gazen, Asyncronous iterative algoritms wit flexible communication for nonlinear network flow problems, Journal of Parallel and Distributed Computing, vol. 38, pp. 1 15, [10] A. Frommer and D. Szyld, On asyncronous iterations, Journal of Computational and Applied Matematics, vol. 123, no. 1 2, pp , 2000, numerical Analysis Vol. III: Linear Algebra. [Online]. Available: ttp:// [11] D. Cazan and W. Miranker, Caotic relaxation, Linear algebra and its applications, vol. 2, no. 2, pp , [12] P. Tseng, D. Bertsekas, and J. Tsitsiklis, Partially asyncronous, parallel algoritms for network flow and oter problems, SIAM Journal on Control and Optimization, vol. 28, no. 3, pp , [13] B. Lubacevsky and D. Mitra, A caotic asyncronous algoritm for computing te fixed-point of a nonnegative matrix of unit spectral radius, Journal of te ACM, vol. 33, no. 1, pp , [14] A. Newton and A. Sangiovanni-Vincentelli, Relaxation-based electrical simulation, IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 3, no. 4, pp , [15] M. Marin, Gpu-enanced power flow analysis, P.D. dissertation, Informatique Perpignan and University college Dublin, 2015, tèse de doctorat dirigée par Defour, David et Milano, Federico. [Online]. Available: ttp:// [16] Nvidia s next generation CUDA compute arcitecture: Kepler GK110, [17] S. Collange, Design callenges of GPGPU arcitectures: specialized aritmetic units and exploitation of regularity, P.D. dissertation, Univ. de Perpignan, Nov [Online]. Available: ttps://tel.arcivesouvertes.fr/tel [18] C. Cuda, Programming guide, Nvidia Corporation, July, [19] J. Miellou, D. El Baz, and P. Spiteri, A new class of asyncronous iterative algoritms wit order intervals, Matematics of Computation of te American Matematical Society, vol. 67, no. 221, pp , [20] T. Davis and E. Palamadai Natarajan, Algoritm 907: KLU, a direct sparse solver for circuit simulation problems, ACM Transactions on Matematical Software, vol. 37, no. 3, pp. 36:1 36:17, Sep [Online]. Available: ttp://doi.acm.org/ / REFERENCES [1] F. Milano, Power system modelling and scripting. London, UK: Springer, 2010.

Asynchronous Power Flow on Graphic Processing Units

Asynchronous Power Flow on Graphic Processing Units Asyncronous Power Flow on Grapic Processing Units Manuel Marin, David Defour, Federico Milano To cite tis version: Manuel Marin, David Defour, Federico Milano. Asyncronous Power Flow on Grapic Processing

More information

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various

More information

Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs

Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Per Ostlund Department of Computer and Information Science Linkoping University SE-58183 Linkoping, Sweden per.ostlund@liu.se Kristian

More information

Computer Physics Communications. Multi-GPU acceleration of direct pore-scale modeling of fluid flow in natural porous media

Computer Physics Communications. Multi-GPU acceleration of direct pore-scale modeling of fluid flow in natural porous media Computer Pysics Communications 183 (2012) 1890 1898 Contents lists available at SciVerse ScienceDirect Computer Pysics Communications ournal omepage: www.elsevier.com/locate/cpc Multi-GPU acceleration

More information

4.1 Tangent Lines. y 2 y 1 = y 2 y 1

4.1 Tangent Lines. y 2 y 1 = y 2 y 1 41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange

More information

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu

More information

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,

More information

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically 2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use

More information

Section 2.3: Calculating Limits using the Limit Laws

Section 2.3: Calculating Limits using the Limit Laws Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give

More information

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688

More information

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness 1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,

More information

Distributed and Optimal Rate Allocation in Application-Layer Multicast

Distributed and Optimal Rate Allocation in Application-Layer Multicast Distributed and Optimal Rate Allocation in Application-Layer Multicast Jinyao Yan, Martin May, Bernard Plattner, Wolfgang Mülbauer Computer Engineering and Networks Laboratory, ETH Zuric, CH-8092, Switzerland

More information

Haar Transform CS 430 Denbigh Starkey

Haar Transform CS 430 Denbigh Starkey Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar

More information

Minimizing Memory Access By Improving Register Usage Through High-level Transformations

Minimizing Memory Access By Improving Register Usage Through High-level Transformations Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg

More information

3.6 Directional Derivatives and the Gradient Vector

3.6 Directional Derivatives and the Gradient Vector 288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te

More information

Symmetric Tree Replication Protocol for Efficient Distributed Storage System*

Symmetric Tree Replication Protocol for Efficient Distributed Storage System* ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University

More information

13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR

13.5 DIRECTIONAL DERIVATIVES and the GRADIENT VECTOR 13.5 Directional Derivatives and te Gradient Vector Contemporary Calculus 1 13.5 DIRECTIONAL DERIVATIVES and te GRADIENT VECTOR Directional Derivatives In Section 13.3 te partial derivatives f x and f

More information

Numerical Derivatives

Numerical Derivatives Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten

More information

Investigating an automated method for the sensitivity analysis of functions

Investigating an automated method for the sensitivity analysis of functions Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands

More information

Density Estimation Over Data Stream

Density Estimation Over Data Stream Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University

More information

An Anchor Chain Scheme for IP Mobility Management

An Anchor Chain Scheme for IP Mobility Management An Ancor Cain Sceme for IP Mobility Management Yigal Bejerano and Israel Cidon Department of Electrical Engineering Tecnion - Israel Institute of Tecnology Haifa 32000, Israel E-mail: bej@tx.tecnion.ac.il.

More information

Linear Interpolating Splines

Linear Interpolating Splines Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation

More information

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Okan Yilmaz and Ing-Ray Cen Computer Science Department Virginia Tec {oyilmaz, ircen}@vt.edu

More information

Chapter K. Geometric Optics. Blinn College - Physics Terry Honan

Chapter K. Geometric Optics. Blinn College - Physics Terry Honan Capter K Geometric Optics Blinn College - Pysics 2426 - Terry Honan K. - Properties of Ligt Te Speed of Ligt Te speed of ligt in a vacuum is approximately c > 3.0µ0 8 mês. Because of its most fundamental

More information

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION Martin Kraus Computer Grapics and Visualization Group, Tecnisce Universität Müncen, Germany krausma@in.tum.de Magnus Strengert Visualization and Interactive

More information

The Euler and trapezoidal stencils to solve d d x y x = f x, y x

The Euler and trapezoidal stencils to solve d d x y x = f x, y x restart; Te Euler and trapezoidal stencils to solve d d x y x = y x Te purpose of tis workseet is to derive te tree simplest numerical stencils to solve te first order d equation y x d x = y x, and study

More information

Intra- and Inter-Session Network Coding in Wireless Networks

Intra- and Inter-Session Network Coding in Wireless Networks Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,

More information

Multi-Stack Boundary Labeling Problems

Multi-Stack Boundary Labeling Problems Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,

More information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information Unsupervised Learning for Hierarcical Clustering Using Statistical Information Masaru Okamoto, Nan Bu, and Tosio Tsuji Department of Artificial Complex System Engineering Hirosima University Kagamiyama

More information

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial

More information

Piecewise Polynomial Interpolation, cont d

Piecewise Polynomial Interpolation, cont d Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined

More information

Packet Switching Networks. Jonathan S. Turner. Computer and Communications Research Center. the result of user connections that pass through the

Packet Switching Networks. Jonathan S. Turner. Computer and Communications Research Center. the result of user connections that pass through the Fluid Flow Loading Analysis of Packet Switcing Networks Jonatan S. Turner Computer and Communications Researc Center Wasington University, St. Louis, MO 63130 Abstract Recent researc in switcing as concentrated

More information

Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes

Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganograpic Scemes Jessica Fridric Dept. of Electrical Engineering, SUNY Bingamton, Bingamton, NY 3902-6000, USA fridric@bingamton.edu

More information

4.2 The Derivative. f(x + h) f(x) lim

4.2 The Derivative. f(x + h) f(x) lim 4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially

More information

On the Use of Radio Resource Tests in Wireless ad hoc Networks

On the Use of Radio Resource Tests in Wireless ad hoc Networks Tecnical Report RT/29/2009 On te Use of Radio Resource Tests in Wireless ad oc Networks Diogo Mónica diogo.monica@gsd.inesc-id.pt João Leitão jleitao@gsd.inesc-id.pt Luis Rodrigues ler@ist.utl.pt Carlos

More information

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks Tis paper was presented as part of te main tecnical program at IEEE INFOCOM 20 An Analytical Approac to Real-Time Misbeavior Detection in IEEE 802. Based Wireless Networks Jin Tang, Yu Ceng Electrical

More information

A UPnP-based Decentralized Service Discovery Improved Algorithm

A UPnP-based Decentralized Service Discovery Improved Algorithm Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol.1, No.1, Marc 2013, pp. 21~26 ISSN: 2089-3272 21 A UPnP-based Decentralized Service Discovery Improved Algoritm Yu Si-cai*, Wu Yan-zi,

More information

ITERNET of Things (IoT) envisages a future in which a large

ITERNET of Things (IoT) envisages a future in which a large IEEE TANSACTIONS ON VEHICULA TECHNOLOGY, VOL. 66, NO. 10, OCTOBE 2017 9381 An Accurate Security Game for Low-esource IoT Devices Hicem Sedjelmaci, Member, IEEE, Sidi Moamed Senouci, Member, IEEE, and Tarik

More information

Cubic smoothing spline

Cubic smoothing spline Cubic smooting spline Menu: QCExpert Regression Cubic spline e module Cubic Spline is used to fit any functional regression curve troug data wit one independent variable x and one dependent random variable

More information

Announcements. Lilian s office hours rescheduled: Fri 2-4pm HW2 out tomorrow, due Thursday, 7/7. CSE373: Data Structures & Algorithms

Announcements. Lilian s office hours rescheduled: Fri 2-4pm HW2 out tomorrow, due Thursday, 7/7. CSE373: Data Structures & Algorithms Announcements Lilian s office ours resceduled: Fri 2-4pm HW2 out tomorrow, due Tursday, 7/7 CSE373: Data Structures & Algoritms Deletion in BST 2 5 5 2 9 20 7 0 7 30 Wy migt deletion be arder tan insertion?

More information

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;

More information

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of IP MULTICASTING FOR WIRELESS MOBILE OSTS George Xylomenos and George C. Polyzos fxgeorge,polyzosg@cs.ucsd.edu Computer Systems Laboratory Department of Computer Science and Engineering University of California,

More information

Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks

Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Peyman Faizian, Md Safayat Raman, Md Atiqul Molla, Xin Yuan Department of Computer Science Florida State University

More information

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising

More information

RECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL

RECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL IV. Évfolyam 3. szám - 2009. szeptember Horvát Zoltán orvat.zoltan@zmne.u REONSTRUTING OF GIVEN PIXEL S THREE- DIMENSIONL OORDINTES GIVEN Y PERSPETIVE DIGITL ERIL PHOTOS Y PPLYING DIGITL TERRIN MODEL bsztrakt/bstract

More information

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art Multi-Objective Particle Swarm Optimizers: A Survey of te State-of-te-Art Margarita Reyes-Sierra and Carlos A. Coello Coello CINVESTAV-IPN (Evolutionary Computation Group) Electrical Engineering Department,

More information

Implementation of Integral based Digital Curvature Estimators in DGtal

Implementation of Integral based Digital Curvature Estimators in DGtal Implementation of Integral based Digital Curvature Estimators in DGtal David Coeurjolly 1, Jacques-Olivier Lacaud 2, Jérémy Levallois 1,2 1 Université de Lyon, CNRS INSA-Lyon, LIRIS, UMR5205, F-69621,

More information

Energy efficient temporal load aware resource allocation in cloud computing datacenters

Energy efficient temporal load aware resource allocation in cloud computing datacenters Vakilinia Journal of Cloud Computing: Advances, Systems and Applications (2018) 7:2 DOI 10.1186/s13677-017-0103-2 Journal of Cloud Computing: Advances, Systems and Applications RESEARCH Energy efficient

More information

2.8 The derivative as a function

2.8 The derivative as a function CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in

More information

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2

MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 MATH 5a Spring 2018 READING ASSIGNMENTS FOR CHAPTER 2 Note: Tere will be a very sort online reading quiz (WebWork) on eac reading assignment due one our before class on its due date. Due dates can be found

More information

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University

More information

SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University

SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS Sanuj V. Sarin 1, Hakan Delic 2 and Jung H. Kim 3 1 Hewlett-Packard Company 24001 East Mission Avenue Spokane, Wasington 99109, USA 2 Signal

More information

Redundancy Awareness in SQL Queries

Redundancy Awareness in SQL Queries Redundancy Awareness in QL Queries Bin ao and Antonio Badia omputer Engineering and omputer cience Department University of Louisville bin.cao,abadia @louisville.edu Abstract In tis paper, we study QL

More information

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method Te Open Plasma Pysics Journal, 2010, 3, 29-35 29 Open Access Alternating Direction Implicit Metods for FDTD Using te Dey-Mittra Embedded Boundary Metod T.M. Austin *, J.R. Cary, D.N. Smite C. Nieter Tec-X

More information

Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks

Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Hulya Seferoglu, Atina Markopoulou EECS Dept, University of California, Irvine {seferog, atina}@uci.edu Abstract We

More information

Real-Time Wireless Routing for Industrial Internet of Things

Real-Time Wireless Routing for Industrial Internet of Things Real-Time Wireless Routing for Industrial Internet of Tings Cengjie Wu, Dolvara Gunatilaka, Mo Sa, Cenyang Lu Cyber-Pysical Systems Laboratory, Wasington University in St. Louis Department of Computer

More information

CHAPTER 7: TRANSCENDENTAL FUNCTIONS

CHAPTER 7: TRANSCENDENTAL FUNCTIONS 7.0 Introduction and One to one Functions Contemporary Calculus 1 CHAPTER 7: TRANSCENDENTAL FUNCTIONS Introduction In te previous capters we saw ow to calculate and use te derivatives and integrals of

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Researc in Computer Science and Software Engineering Researc Paper Available online at: www.ijarcsse.com Performance

More information

A Bidirectional Subsethood Based Similarity Measure for Fuzzy Sets

A Bidirectional Subsethood Based Similarity Measure for Fuzzy Sets A Bidirectional Subsetood Based Similarity Measure for Fuzzy Sets Saily Kabir Cristian Wagner Timoty C. Havens and Derek T. Anderson Intelligent Modelling and Analysis (IMA) Group and Lab for Uncertainty

More information

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined

More information

Vector Processing Contours

Vector Processing Contours Vector Processing Contours Andrey Kirsanov Department of Automation and Control Processes MAMI Moscow State Tecnical University Moscow, Russia AndKirsanov@yandex.ru A.Vavilin and K-H. Jo Department of

More information

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21,

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21, Proceedings of te 8t WSEAS International Conference on Neural Networks, Vancouver, Britis Columbia, Canada, June 9-2, 2007 3 Neural Network Structures wit Constant Weigts to Implement Dis-Jointly Removed

More information

Brief Contributions. A Hybrid Flash File System Based on NOR and NAND Flash Memories for Embedded Devices 1 INTRODUCTION

Brief Contributions. A Hybrid Flash File System Based on NOR and NAND Flash Memories for Embedded Devices 1 INTRODUCTION 1002 IEEE TRANSACTIONS ON COMPUTERS, VOL. 57, NO. 7, JULY 2008 Brief Contributions A Hybrid Flas File System Based on NOR and NAND Flas Memories for Embedded Devices Cul Lee, Student Member, IEEE, Sung

More information

Introduction to Computer Graphics 5. Clipping

Introduction to Computer Graphics 5. Clipping Introduction to Computer Grapics 5. Clipping I-Cen Lin, Assistant Professor National Ciao Tung Univ., Taiwan Textbook: E.Angel, Interactive Computer Grapics, 5 t Ed., Addison Wesley Ref:Hearn and Baker,

More information

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions

More information

ICES REPORT Isogeometric Analysis of Boundary Integral Equations

ICES REPORT Isogeometric Analysis of Boundary Integral Equations ICES REPORT 5-2 April 205 Isogeometric Analysis of Boundary Integral Equations by Mattias Taus, Gregory J. Rodin and Tomas J. R. Huges Te Institute for Computational Engineering and Sciences Te University

More information

Sensor Data Collection with Expected Reliability Guarantees

Sensor Data Collection with Expected Reliability Guarantees Sensor Data Collection wit Expected Reliability Guarantees Qi Han, Iosif Lazaridis, Sarad Merotra, Nalini Venkatasubramanian Department of Computer Science, University of California, Irvine, CA 9697 qan,iosif,sarad,nalini

More information

Notes: Dimensional Analysis / Conversions

Notes: Dimensional Analysis / Conversions Wat is a unit system? A unit system is a metod of taking a measurement. Simple as tat. We ave units for distance, time, temperature, pressure, energy, mass, and many more. Wy is it important to ave a standard?

More information

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer

More information

More on Functions and Their Graphs

More on Functions and Their Graphs More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in

More information

H-Adaptive Multiscale Schemes for the Compressible Navier-Stokes Equations Polyhedral Discretization, Data Compression and Mesh Generation

H-Adaptive Multiscale Schemes for the Compressible Navier-Stokes Equations Polyhedral Discretization, Data Compression and Mesh Generation H-Adaptive Multiscale Scemes for te Compressible Navier-Stokes Equations Polyedral Discretization, Data Compression and Mes Generation F. Bramkamp 1, B. Gottsclic-Müller 2, M. Hesse 1, P. Lamby 2, S. Müller

More information

Analytical CHEMISTRY

Analytical CHEMISTRY ISSN : 974-749 Grap kernels and applications in protein classification Jiang Qiangrong*, Xiong Zikang, Zai Can Department of Computer Science, Beijing University of Tecnology, Beijing, (CHINA) E-mail:

More information

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng An ffective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Ciming Huang and ei-heng Ceng 5 De c e mbe r0 International Journal of Advanced Information Tecnologies (IJAIT),

More information

SEATTLE: A Scalable Ethernet Architecture for Large Enterprises

SEATTLE: A Scalable Ethernet Architecture for Large Enterprises TRC00349 ACM (Typeset by SPi, Manila, Pilippines) 1 of 35 February 23, 2011 14:31 SEATTLE: A Scalable Eternet Arcitecture for Large Enterprises 1 CHANGHOON KIM, Microsoft MATTHEW CAESAR, University of

More information

CSE 332: Data Structures & Parallelism Lecture 8: AVL Trees. Ruth Anderson Winter 2019

CSE 332: Data Structures & Parallelism Lecture 8: AVL Trees. Ruth Anderson Winter 2019 CSE 2: Data Structures & Parallelism Lecture 8: AVL Trees Rut Anderson Winter 29 Today Dictionaries AVL Trees /25/29 2 Te AVL Balance Condition: Left and rigt subtrees of every node ave eigts differing

More information

Mean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks

Mean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks Mean Waiting Time Analysis in Finite Storage ueues for Wireless ellular Networks J. YLARINOS, S. LOUVROS, K. IOANNOU, A. IOANNOU 3 A.GARMIS 2 and S.KOTSOOULOS Wireless Telecommunication Laboratory, Department

More information

Tuning MAX MIN Ant System with off-line and on-line methods

Tuning MAX MIN Ant System with off-line and on-line methods Université Libre de Bruxelles Institut de Recerces Interdisciplinaires et de Développements en Intelligence Artificielle Tuning MAX MIN Ant System wit off-line and on-line metods Paola Pellegrini, Tomas

More information

An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques

An Efficient Fault-Tolerant Multicast Routing Protocol with Core-Based Tree Techniques An Eicient Fault-Tolerant Multicast outing Protocol wit Core-Based Tree Tecniques Weijia Jia + Wei Zao * + Department o Computer Science City University o Hong Kong Kowloon, Hong Kong Email: {wjia, gxu}@cs.cityu.edu.k

More information

CE 221 Data Structures and Algorithms

CE 221 Data Structures and Algorithms CE Data Structures and Algoritms Capter 4: Trees (AVL Trees) Text: Read Weiss, 4.4 Izmir University of Economics AVL Trees An AVL (Adelson-Velskii and Landis) tree is a binary searc tree wit a balance

More information

Programming Real-Time Applications with Signal

Programming Real-Time Applications with Signal Programming Real-Time Applications wit Signal Paul Le Guernic, Tierry Gautier, Micel Le Borgne, Claude Le Maire To cite tis version: Paul Le Guernic, Tierry Gautier, Micel Le Borgne, Claude Le Maire. Programming

More information

SlidesGen: Automatic Generation of Presentation Slides for a Technical Paper Using Summarization

SlidesGen: Automatic Generation of Presentation Slides for a Technical Paper Using Summarization Proceedings of te Twenty-Second International FLAIRS Conference (2009) SlidesGen: Automatic Generation of Presentation Slides for a Tecnical Paper Using Summarization M. Sravanti, C. Ravindranat Cowdary

More information

1.4 RATIONAL EXPRESSIONS

1.4 RATIONAL EXPRESSIONS 6 CHAPTER Fundamentals.4 RATIONAL EXPRESSIONS Te Domain of an Algebraic Epression Simplifying Rational Epressions Multiplying and Dividing Rational Epressions Adding and Subtracting Rational Epressions

More information

Classification of Osteoporosis using Fractal Texture Features

Classification of Osteoporosis using Fractal Texture Features Classification of Osteoporosis using Fractal Texture Features V.Srikant, C.Dines Kumar and A.Tobin Department of Electronics and Communication Engineering Panimalar Engineering College Cennai, Tamil Nadu,

More information

Lehrstuhl für Informatik 10 (Systemsimulation)

Lehrstuhl für Informatik 10 (Systemsimulation) FRIEDRICH-ALEXANDER-UNIVERSITÄT ERLANGEN-NÜRNBERG INSTITUT FÜR INFORMATIK (MATHEMATISCHE MASCHINEN UND DATENVERARBEITUNG) Lerstul für Informatik 10 (Systemsimulation) PDE based Video Compression in Real

More information

Application of a Key Value Paradigm to Logic Factoring

Application of a Key Value Paradigm to Logic Factoring INVITED PAPER Application of a Key Value Paradigm to Logic Factoring Te autor first revisits a classic algoritm for algebraic factoring to establis a stronger connection to te functional intent rater tan

More information

Author's personal copy

Author's personal copy Autor's personal copy Information Processing Letters 09 (009) 868 875 Contents lists available at ScienceDirect Information Processing Letters www.elsevier.com/locate/ipl Elastic tresold-based admission

More information

Provably-Secure Logic Locking: From Theory To Practice

Provably-Secure Logic Locking: From Theory To Practice Provably-Secure Logic Locking: From Teory To Practice Muammad Yasin New York University, New York, USA yasin@nyu.edu Moammed Asraf New York University Abu Dabi, UAE ma199@nyu.edu Abrajit Sengupta New York

More information

Multi-View Clustering with Constraint Propagation for Learning with an Incomplete Mapping Between Views

Multi-View Clustering with Constraint Propagation for Learning with an Incomplete Mapping Between Views Multi-View Clustering wit Constraint Propagation for Learning wit an Incomplete Mapping Between Views Eric Eaton Bryn Mawr College Computer Science Department Bryn Mawr, PA 19010 eeaton@brynmawr.edu Marie

More information

HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS

HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS N.G.Bardis Researc Associate Hellenic Ministry of te Interior, Public Administration and Decentralization 8, Dragatsaniou str., Klatmonos S. 0559, Greece

More information

Arrays in a Lazy Functional Language a case study: the Fast Fourier Transform

Arrays in a Lazy Functional Language a case study: the Fast Fourier Transform Arrays in a Lazy Functional Language a case study: te Fast Fourier Transform Pieter H. Hartel and Willem G. Vree Department of Computer Systems University of Amsterdam Kruislaan 403, 1098 SJ Amsterdam,

More information

Mean Shifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy.

Mean Shifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy. Mean Sifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy. Margret Keuper Cair of Pattern Recognition and Image Processing Computer Science Department

More information

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS NTNN SPHRICL COORDINT SSTMS ND THIR PPLICTION IN COMBINING RSULTS FROM DIFFRNT NTNN ORINTTIONS llen C. Newell, Greg Hindman Nearfield Systems Incorporated 133. 223 rd St. Bldg. 524 Carson, C 9745 US BSTRCT

More information

Protecting Storage Location Privacy in Sensor Networks

Protecting Storage Location Privacy in Sensor Networks Protecting Storage Location Privacy in Sensor Networks Jianming Zou, Wenseng Zang, and Daji Qiao Iowa State University Ames, IA 511 Email: {jmzou,wzang,daji}@iastate.edu ASTAT Numerous scemes ave been

More information

Solutions Manual for Fundamentals of Fluid Mechanics 7th edition by Munson Rothmayer Okiishi and Huebsch

Solutions Manual for Fundamentals of Fluid Mechanics 7th edition by Munson Rothmayer Okiishi and Huebsch Solutions Manual for Fundamentals of Fluid Mecanics 7t edition by Munson Rotmayer Okiisi and Huebsc Link full download : ttps://digitalcontentmarket.org/download/solutions-manual-forfundamentals-of-fluid-mecanics-7t-edition-by-munson-rotmayer-okiisi-and-uebsc/

More information

Forward End-To-End delay Analysis for AFDX networks

Forward End-To-End delay Analysis for AFDX networks Forward End-To-End delay Analysis for AFDX networks Nassima Benammar, Frederic Ridouard, Henri Bauer and Pascal Ricard e-mail: {nassima.benammar,frederic.ridouard, pascal.ricard}@univ-poitiers.fr enri.bauer@ensma.fr

More information

Fault Localization Using Tarantula

Fault Localization Using Tarantula Class 20 Fault localization (cont d) Test-data generation Exam review: Nov 3, after class to :30 Responsible for all material up troug Nov 3 (troug test-data generation) Send questions beforeand so all

More information

Computing geodesic paths on manifolds

Computing geodesic paths on manifolds Proc. Natl. Acad. Sci. USA Vol. 95, pp. 8431 8435, July 1998 Applied Matematics Computing geodesic pats on manifolds R. Kimmel* and J. A. Setian Department of Matematics and Lawrence Berkeley National

More information

UUV DEPTH MEASUREMENT USING CAMERA IMAGES

UUV DEPTH MEASUREMENT USING CAMERA IMAGES ABCM Symposium Series in Mecatronics - Vol. 3 - pp.292-299 Copyrigt c 2008 by ABCM UUV DEPTH MEASUREMENT USING CAMERA IMAGES Rogerio Yugo Takimoto Graduate Scool of Engineering Yokoama National University

More information

Truncated Newton-based multigrid algorithm for centroidal Voronoi diagram calculation

Truncated Newton-based multigrid algorithm for centroidal Voronoi diagram calculation NUMERICAL MATHEMATICS: Teory, Metods and Applications Numer. Mat. Teor. Met. Appl., Vol. xx, No. x, pp. 1-18 (200x) Truncated Newton-based multigrid algoritm for centroidal Voronoi diagram calculation

More information

Materials: Whiteboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector.

Materials: Whiteboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector. Adam Clinc Lesson: Deriving te Derivative Grade Level: 12 t grade, Calculus I class Materials: Witeboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector. Goals/Objectives:

More information