Hashing Functions Performance in Packet Classification

Size: px
Start display at page:

Download "Hashing Functions Performance in Packet Classification"

Transcription

1 Hashig Fuctios Performace i Packet Classificatio Mahmood Ahmadi ad Stepha Wog Computer Egieerig Laboratory Faculty of Electrical Egieerig, Mathematics ad Computer Sciece Delft Uiversity of Techology {mahmadi, stepha}@ce.et.tudelft.l Abstract Packet classificatio remais a importat aspect of etwork processig as it ecompasses icreasigly more fuctioality due to ewly itroduced services. Essetially, it etails the matchig of icomig packets agaist a database of rules performig the operatio that is associated with the matchig rule with the highest priority. Withi the hashigbased packet classificatio algorithms, the tuple space search algorithm is gaiig much iterest. Usig tuple spaces, the rules ca ow be subdivided ito sets ad i tur these sets ca be searched i parallel. Withi each set, the hashig fuctios determie the locatio of storig the rules. However, depedig o the chose collectio of hashig fuctios, rules (withi a set) ca be mapped to the same locatio (cotaiig multiple buckets to store the rules) resultig i a collisio. A side-effect of such collisios is that more memory accesses are eeded to resolve the collisio resultig i degraded performace. I this paper, we compare ad evaluate differet hashig fuctios takig from the H3 class of hashig fuctios usig which collisios ca be reduced ad i tur reduce the average bucket sizes. Our results show that whe usig the H3 class of hashig fuctios, we were able to reduce the umber of collisios by at least 7% ad by at most 49% whe compared to other hashig fuctios. Keywords: Packet classificatio, tuple space, uiversal hashig fuctio, collisio I. INTRODUCTION Traditioally, packet classificatio etailed the forwardig of packets solely based o the destiatio address that is specified i oe of the may header fields withi a packet. However, the importace of packet classificatio has icreased greatly with the itroductio of services like Quality of Service (QoS), virtual private etwork (VPN), policy-based routig, traffic shapig, firewalls, ad etwork security. Additioal criteria had to be satisfied by takig ito accout additioal header fields from the packet, such as, source address, protocol type, source ad destiatio port umbers (see Figure 1). Packet classificatio ca be see as the categorizatio of icomig packets based o their headers accordig to specific criteria that examie specific fields withi a packet header. The criteria are comprised of a set of rules that specify the cotet of specific packet header fields to result i a match [3][4][9]. Traditioally, hashig is utilized i packet classificatio to speed up the process of determiig whether a icomig packet matches a certai rule (that i tur determie the actio to take o the packet). Furthermore, certai rules oly examie specific fields (sometimes eve oly the prefix) of the packet headers specified usig a tuple. Cosequetly, rules that examie the same fields (or the prefix) are combied i a so-called tuple space with all those rules hashed ito a hash table. Summarizig, the (prefix of) headers of icomig packets are selected for each tuple (the umber of tuples depeds o the rule set) ad hashed to determie whether it matches a rule withi that particular tuple space stored i the hash table. A commo problem i usig hashig is collisio, i.e., the mappig of rules i the hash table ca be to the same hash table locatio. Cosequetly, whe a icomig packet is hashed to a hash table etry cotaiig multiple rules it must be matched to all these rules resultig i much loger processig time. Therefore, the choice of hashig fuctios will have a certai impact o the umber of collisios. I literature, hashig fuctios such as belogig to the H3 class have bee evaluated for radom data by radom selectio of hashig fuctios [6]. As metioed before, rules ca be categorized i the tuple-space after which hashig fuctios are used to determie the storage locatio of these rules. I this paper, we propose to utilize the H3 class of hashig fuctios to decrease the umber of metioed collisios ad to desig a adaptive software packet classifier. I particular, we derive a hashig fuctio through the H3 class of hashig fuctios i order to demostrate its effect o the umber of collisios ad the average bucket size. More specifically, we ivestigate several well-kow hashig fuctios to determie the umber of collisios ad show that the umber of collisios ca be further reduced by at least 7% ad by at most 49% for real rule-set databases by utilizig class H3 hashig fuctios. It also decreases the average bucket size (a buffer that stores multiple rules) i compared to other hashig fuctios. The paper is orgaized as follows: Sectio II describes related work. Sectios III represets the tuple space algorithms for packet classificatio, the defiitio of the class H3 hashig fuctios, ad packet classifier architecture. Sectio IV presets related results. Sectio V, we draw the overall coclusios. II. RELATED WORK I this sectio, we preset differet related works by others i packet classificatio algorithms that utilize hashig fuctios. I [6], the H3 class of hashig fuctios as a class of uiversal hashig fuctios with implemetatios i

2 Source port Destiatio port Protocol Source IP address Destiatio IP address 16 bits 16 bits 8 bits 32 bits 32 bits Trasport layer Network layer Fig. 1. Most importat fields that are used i classificatio algorithms hardware, are itroduced. The hashig fuctio performace usig maximum search legth that is called llps (legth of the logest prob sequece) is evaluated. The hashig fuctio selectio procedure is radom. I [9][11], a packet classificatio algorithm usig tuple space is itroduced that cocateates the ecessary umber of bits from rule-sets ad icomig packets to make a hash key. To decrease the umber of collisios, the memory size is icreased. It also assumes that the hashig fuctio is perfect ad the complexity of packet classificatio algorithm is ivestigated. I practice, to achieve a perfect hashig fuctio is difficult. I [8], a Fast Hash Table (FHT) architecture usig a Bloom filter for packet classificatio ad IP lookup is preseted. FHT icreases the memory size to several times usig a TCAM memory i order to reduce collisios ad memory access times i the hash table ad utilizes a class of uiversal hashig fuctios where the hashig fuctios are selected radomly. I our work, for each rule-set database, we fid a H3 hashig fuctio via searchig through oe thousad hashig fuctios from the H3 class of hashig fuctios. This fuctio is utilized by our software packet classifier that stores rules i a hash table. The software packet classifier decreases the umber of collisios by achievig a hashig fuctio with a miimum umber of collisios ad cosequetly improves the packet classificatio speed ad throughput. III. TUPLE SPACE PACKET CLASSIFICATION AND HASHING FUNCTIONS I this sectio, the cocept of the tuple space packet classificatio algorithm, related hashig fuctios, ad a software packet classifier are preseted. A. Tuple Space Classificatio A high level approach for multiple field search employs tuple space. A tuple defies the umber of specified bits i each field of the rule. Sriivasa, et. al. itroduced the tuple space approach ad the collectio of tuple search algorithms i [9][10][11]. We provide a example of rule-set for rule classificatio o five fields i Table I. I Table I, words eq ad gt are abbreviatios of operators represetig equal to ad greater tha a port umber i the expressed rule. Address prefixes cover 32- bit addresses ad port rages cover 16-bit port umbers, for address prefix fields, the umber of specified bits is simply the umber of o-wildcard bits i the prefix, for the protocol fields the value is simply a boolea: 1 if a Fig. 2. Nestig level (80, 80) Rage ID (0, 65535) (1024, 65535) Assigig values for rages, based o Nestig Level ad Rage-ID protocol is specified, 0 if a wildcard is specified [9][11][12]. The umber of specified bits i a port rage are ot as straightforward to defie. The authors itroduce the cocept of estig levels ad Rage-ID to defie the tuple value for port rages. The estig level specifies the layer of the hierarchy ad the Rage-IDs uiquely labels the rage withi its layer. I this way, we ca covert all port rages to a (Nestig level, Rage-ID) pair. The estig level is used as the tuple value for the rage, ad the Rage-ID is used to idetify the specific rage withi the tuple. The full rage, i this example ( ) always has the id 0. The two rages at level 1, amely (0, 1023) ad (1024, 65535) i our example receive id 0 ad 1 respectively. The example of mappig port rage to estig level ad Rage-ID for Table I is depicted i Figure 2. For example, a search key for the tuple [8, 24, 2, 0, 1] is costructed by cocateatig the first octet of the packet source address, the first three octets of the packet destiatio address, the Rage-ID of the source port, the rage at estig level 2 coverig the packet source port umber, the Rage- ID of the destiatio port, rage at estig level 0 coverig the packet destiatio port umber, ad the protocol field. All algorithms employig the tuple space approach ivolve a search i the complete tuple space or a subset thereof. The tuple space techiques ca exploit parallelism [11]. For example rule set i Table I a search key would have to probe 5 tuple istead of searchig all 6 tuples. I practice, the use of real rule sets i tuple space search reduced the umber of searches by a factor of four to seve [9][11]. B. Hashig Fuctios Several kids of hashig fuctios are utilized i packet classificatio: additive, rotative, bit extractio, XOR-based, mixed, ad uiversal hashig fuctios [5][6]. I additive hashig fuctios, the hash value is costructed by traversig

3 Rules Destiatio IP (address Source IP (address mask) Port No. Protocol No. Tuple space mask) R * * [32, 24, 0, 0 ] ( ) ( ) R eq www tcp [24, 32, 2, 1] ( ) ( ) R gt 1023 udp [32, 24, 1, 1] ( ) ( ) R ( ) ( ) eq www udp [16, 8, 2, 1] R ( ) ( ) eq www tcp [16, 8, 2, 1] R ( ) ( ) * * [0, 0, 0, 0] TABLE I EXAMPLE RULES AND RELATED TUPLES. through the data ad cotiually icremetig a iitial value by a calculated value relative to a elemet withi the data. The calculatio performed o the elemet value is usually i the form of a multiplicatio by a prime umber. I rotative hashig fuctios, every elemet i the data strig is used to costruct the hash value, but ulike additive hashig the values are put through a process of bitwise shiftig. I the bit extractio method, the hashig fuctio etails selectig j bits out of the i bits of the key. I XOR-based hashig fuctios, the i bit key is partitioed ito j bit segmets. The segmets are exclusive-ored to produce the hash address. I the mixed method, the hashig fuctios utilize ay or all of the metioed techiques. It obvious that the performace of these fuctios depedet o the key set [5][6]. These hashig fuctios take loger to execute compared to the earlier metioed fuctios that oly utilize bitwise logical operatios. A solutio to achieve a hashig fuctio that is idepedet from the key set is by utilizig a class of uiversal hashig fuctios that exploits bitwise logical operatios i their defiitio. Let H represet a class of fuctios with iput set A ad output set B. H is said to be uiversal if for all x, y i A, o pair of distict keys collide uder more tha (1/ B )th of the fuctios where B deotes size of B [2]. A special class of uiversal hashig fuctios is called H3 hashig fuctios [2][6]. The H3 class of hashig fuctios are defied as follows: Let A = 0, 1, 2,..., 2 i 1 be the key space, B = 0, 1, 2,..., 2 j 1 be the address space, i deotes the umber of bits i i the key, j deotes the umber of bits i address, Q deotes the set of i j boolea matrices, ad I represets the give key set, I = x 1, x 2,..., x, I A. For a give q Q ad x A, let q(k) be the k th row of the matrix q ad x k be the kth bit of x. The hashig fuctio h q (x) : A B is defied as follows: h q (x) = x 1.q(1) x 2.q(2)... x i.q(i) (1) where. deotes the biary AND operatio ad the exclusive OR operatio. The hashig fuctio from this class ca be easily implemeted i hardware. The hardware stores the i j boolea matrix that ca be orgaized i a bak of registers [6] where the boolea matrices ca be geerated i software ad the loaded ito the bak of registers. Based o the tuple space represetatio for the rule-set database ad IP packets, the size of the iput key is 88 bits log (32 bit source IP address, 32 bit destiatio IP address, 8 bit Rage-ID for source port, 8 bit Rage-ID for destiatio port ad 8 bit protocol field). The maximum size of the tuple or address space is assumed to be 2 16 rules for 16 bit address. Therefore, Q deotes a set of matrices to defie the H3 class of hashig fuctios i the tuple space packet classificatio algorithm. C. Packet Classifier Architecture The tuple space packet classificatio architecture is depicted i Figure 3. Packet search Packet trace Makig hash key Packet matcher Tuple specificatio Actio Rule hash table costructor Rule database Determiig tuple Hash key Hash key m Hash tables for differet tuples 1 B H3 best H3 hashig fuctio selector Fig. 3. The architecture of packet classifier with optimized hashig fuctios i tuple space. The architecture comprises two mai compoets: rules hash table costructor ad the packet search uit. The hash table costructor reads the rules from a rule-set database ad extracts the rule specificatio to determie the correspodig tuple that the rule belogs to. After determiig the tuple, the rule should be hashed i the hash table associated with the tuple. Subsequetly, the hash key eeds to geerated utilizig the hashig fuctio after which the rules are stored i the hash table. Before geeratig the hash key, the H3 hashig fuctio selector -compoet determies the best hashig fuctio withi the H3 class of hashig fuctios. This compoet receives differet rules from the

4 rule database ad hash them usig differet hashig fuctios from class H3 (i here 1000 hashig fuctios) to derive the hashig fuctio with the miimum umber of collisios that is called H3 best. Afterwards, this hashig fuctio is utilized by the packet search compoet for the matchig of icomig packets agaist stored rules i the hash tables related to tuples. I the hash table costructio, differet hash tables with uequal sizes are created sice each hash table correspods to a sigle tuple that relates to differet rules with their ow specificatios. Usually more tha half of the rules belog to two tuples oly. This is depicted i Figure 3. I this figure, m deotes the umber of tuples ad B represets the bucket size. The packet search compoet of the packet classifier processes the icomig packets to fid the matchig rules i the hash tables correspodig to the tuple specificatios. Therefore, for each icomig packet, a hash key is extracted based o the tuple specificatio. This procedure exploits the geerated hashig fuctio by the hash table costructor. Cosequetly, m hash keys are utilized to access the m hash tables (after hashig) to determie whether matchig rules ca be foud. The importace of a hashig fuctio ca be see i this step, sice the decreasig oe access i hash table costructio step will decrease m (umber of tuples) accesses i packet search. The accessig of the hash table ca be performed i a serial or parallel maer. Fially, the actual packet is checked agaist the foud rules i the packet matcher compoet. For each packet, the umber of hashig operatios are equal to the umber of tuples i the system or the umber of distict hash tables, therefore, the umber of accesses i a sequetial search process per packet is equal to the umber of tuples. Due to the isertio of ew rules ad possible icremetal updates, the rule-set database ca evolve (chage) over time. Therefore, after the sertio of certai rules, the utilized H3 hashig fuctio is o loger desirable sice the ewly iserted rules may create collisio. I this case, we ca defie a update threshold, which is a value that whe exceeded by the umber of ewly iserted rules, causes the packet classifier to execute the hash table costructor compoet to determie a ew H3 hashig fuctio. The value of the update threshold is assumed to be the worst case of the improvemet rate of the system. I here, based o the result sectio, the update threshold is assumed to 7% of umber of rules i the rule-set database. IV. RESULTS For the system test, we utilized differet rule-set databases ad packet traces that are used by Applied Research Laboratory i Washigto Uiversity i St. Louis[7]. I the rule-set database, each rule cosists of 5 header fields icludig [Source IP address, Destiatio IP address, Source port, Destiatio port, Protocol] ad the format IP address prefix i dot-decimal otatio]/[prefix legth] [Destiatio IP address prefix i dot-decimal otatio]/[prefix legth] [Low source port] : [High source port] [Low destiatio port] : [High destiatio port] [Protocol value i hexadecimal]/[protocol mask i hexadecimal] [7]. A example of a rule i the rule-set database is /28 67 : : 67 0x11/0xff. The packet header trace format is [Source IP address i decimal] [Destiatio IP address i decimal] [Source port value i decimal] [Destiatio port value i decimal] [Protocol i decimal]. a example of a packet header i a packet trace is: The specificatios of rule-set databases, ad packet traces are show i Table II. Table II icludes seve rulesets database ad packet traces. The rule-sets FW1, ACL1 ad IPC1 were extracted from real rule-sets ad others were geerated by Classbech bechmark [7]. The results are geerated usig two differet load factors. The first load factor has the value of prime(), where is the umber of rules i the tuple ad the value of prime() represets the size of address space (tuple size). The prime() is the first prime umber that is larger tha. There is o substatial mathematical work that ca defiitely prove the relatioship betwee prime umbers ad pseudo radom umber geerators. Nevertheless, the best results have bee foud whe usig prime umbers. Geeratig prime umbers for each tuple is time cosumig ad implemetatio is ot helpful i hardware. The secod load factor which is easier to implemet i hardware is, where the size of address space i each tuple is 2 [log 2 ]+1 equal to 2 to the power of umber of bits i umber of rules i tuples. I these tables, H3 best represets a fuctio of class H3 hashig fuctios that result i miimum umber of collisios. H3 worst represets a fuctio of class H3 hashig fuctios that result i maximum umber of collisios. We utilize six geeral hashig fuctios that belog to mixed hashig fuctio type as follows: APH, DJBH, DEK, ELF, JS ad CRC [1][5]. The specificatio of metioed hashig fuctios are preseted i Table III. Table III icludes the ame ad the umber of geerated collisios for differet rule-set databases with a load factor of prime(). The fuctio APH is the best hashig fuctio amog the metioed mixed hashig fuctios. Therefore, we oly preset the results of APH hashig fuctio. The umber of geerated collisios for differet hashig fuctios usig the packet classifier is preseted i Table IV. I Table IV, we ca observe that, usig the H3 best of algorithms decreases the umber of collisios by at most 49% ad by at least 7% i compariso to APH hash fuctio for real rule-set databases. It also shows, that 2 [log 2 ]+1, costructig tuple spaces with a load factor of decreases the umber of collisios i compariso to a load factor prime(). The average bucket size for differet hashig fuctios with differet rule-set databases is preseted i Table V. The average bucket size for oempty buckets is also evaluated. Some buckets do ot iclude ay rules, therefore,

5 FW1-100 FW1-1k FW1-5k FW1-10k FW1 ACL1 IPC1 Number of rules Number of tuples Number of Packets TABLE II RULE SET DATABASE AND PACKET TRACE SPECIFICATION. they are excluded from the computatios. Based o Table V, we ca observe that H3 best has slower bucket size i compariso to H3 worst ad APH. The H3 best decreases the average bucket size by at most 9% ad by at least 1.5% i compariso to APH hashig fuctio. The umber of overflow items (these represet the items that ca ot be placed i the related bucket with specified size) i differet hashig fuctios with two differet bucket size, is preseted i Tables VI ad VII. Based o the Tables VI ad VII, we ca observe that the H3 best decreases the umber of overflow items compared to APH ad H3 worst. From the Table V, we ca observe that, the average bucket size for all of hashig fuctios is less tha 2. But the Table VI ad Table VII show that the size of some buckets is larger tha 3. It is due to the distributio of rules i the differet tuples. Our observatios show that more tha half of rules are stored i two tuples ad other tuples oly iclude a small umber of rules. I the tuple with small umber of rules, the umber of collisios are low. I the tuples with large umber of rules, the umber of collisios is more tha other tuples ad the average size of buckets is larger. Fially, utilizig H3 best decreases the average bucket size i the tuple with large umber of rules i compariso to other tuples. From Tables VI ad VII, we 2 [log 2 ]+1 ca observe that the H3 best with a load factor of geerates the lowest umber of collisios, the shortest bucket size ad the lowest umber of overflows i compariso to other hashig fuctios. 25 th IASTED Iteratioal Coferece o Parallel ad Distributed Computig ad Networks (PDCN 2007), pages 70 76, February [2] J. Lawrece Carter ad Mark N. Wegma. Uiversal Classes of Hash Fuctios. I Proceedigs of the 9th aual ACM symposium o Theory of computig, pages ACM Press, [3] P. Gupta ad N. McKeow. Algorithms for Packet Classificatio. Joural of IEEE Network, 15(2):24 32, March-April [4] T. V. Lakshma ad D. Stiliadis. High-speed Policy-based Packet Forwardig Usig Efficiet Multi-dimesioal Rage Matchig. I Proceedigs of Coferece o Applicatios, Techologies, Architectures, ad Protocols for Computer Commuicatio (ACM/SIGCOM), pages , September [5] A. Partow. Geeral Purpose Hash Fuctio Algorithms. programmig/ hashfuctios/idex.html. [6] M. V. Ramakrisha, E. Fu, ad E. Bahcekapili. Efficiet Hardware Hashig Fuctios for High Performace Computers. IEEE Trasactio Computer, 46(12): , [7] H. Sog. Evaluatio of Packet Classificatio Algorithms. hs1/pclasseval.html, [8] H. Sog, J. Turer, S. Dharmapurikar, ad J. Lockwood. Fast Hash Table Lookup Usig Exteded Bloom Filter: A Aid to Network Processig. I Proceedigs of Coferece o Applicatios, Techologies, Architectures, ad Protocols for Computer Commuicatios, pages , August [9] V. Sriivasa. IP Lookup ad Packet Classificatio. PhD thesis, Washigto Uiversity, Sait lous, Missouri, August [10] V. Sriivasa. A Packet Classificatio ad Filter Maagemet System. I Proceedigs of Iteratioal IEEE Coferece INFOCOM, pages , [11] V. Sriivasa, S. Suri, ad G. Varghese. Packet Classificatio usig Tuple Space Search. I Proceedig of Coferece o Applicatios, Techologies, Architectures, ad Protocols for Computer Commuicatio, pages , [12] D. E. Taylor. Models, Algorithms, ad Architectures for Scalable Packet Classificatio. PhD thesis, Departmet of Computer Sciece ad Egieerig Washigto Uiversity, August V. OVERALL CONCLUSIONS I this paper, we preseted a itroductio to the classic packet classificatio problem ad oe classificatio algorithm called tuple search. A overview of hashig fuctios as part of packet classificatio algorithm i the tuple space was give. We implemeted a adaptive software packet classifier that fids optimal hashig fuctio through the class H3 hashig fuctios which is called H3 best. Our implemetatio shows that the utilizatio of a H3 class hashig fuctios i adaptive packet classificatio system decreases the umber of collisios ad average bucket size i compariso to other hashig fuctios. Deductio i umber of collisios, icreases packet classificatio performace ad throughput. REFERENCES [1] M. Ahmadi ad S. Wog. Modified Collisio Packet Classificatio Usig Coutig Bloom Filter i Tuple Space. I Procedigs of the

6 Rules-set Fuctio APH DJBH DEK ELF JS CRC FW1-1k FW1-5k FW1-10k TABLE III DIFFERENT GENERAL HASHING FUNCTIONS SPECIFICATION. 2 [log 2 ]+1 prime() 2 [log 2 ]+1 prime() prime() 2 [log 2 ]+1 FW (-%13) 8(-%66) FW1-1k 273 (-%3) 161(-%17) FW1-5k 1664(-%1) 777(%6) FW1-10k 3242(-%3) 1615(-%6) FW1 73 (-%14) 18(-%49) ACL1 235(-%7) 109(-%17) IPC1 469(-%7) 207(-%28) TABLE IV THE NUMBER OF COLLISIONS FOR DIFFERENT HASHING FUNCTIONS WITH DIFFERENT LOAD FACTORS. prime() 2 [log 2 ]+1 prime() 2 [log 2 ]+1 prime() 2 [log 2 ]+1 FW (-%22) 1.19(-%27) FW1-1k 1.57(-%2) 1.40(-%6) FW1-5k 1.57(-%2) 1.34(-%2) FW1-10k 1.53(-%2) 1.35(-%1.5) FW1 1.41(-%7) 1.42(-%7) ACL1 1.49(-%1.5) 1.28(-%1.5) IPC1 1.41(-%1.5) 1.26(-%9) TABLE V THE AVERAGE BUCKET SIZE FOR DIFFERENT HASHING FUNCTIONS AND DIFFERENT LOAD FACTORS. 2 [log 2 ]+1 prime() 2 [log 2 ]+1 prime() prime() 2 [log 2 ]+1 FW FW1-1k FW1-5k FW1-10k FW ACL IPC TABLE VI THE NUMBER OF OVERFLOWS WHEN THE BUCKET SIZE IS 2. & 2 [log 2 ]+1 prime() 2 [log 2 ]+1 prime() prime() 2 [log 2 ]+1 FW FW1-1k FW1-5k FW1-10k FW ACL IPC TABLE VII THE NUMBER OF OVERFLOWS WHEN THE BUCKET SIZE IS 3.

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015.

Hash Tables. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015. Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Hash Tables xkcd. http://xkcd.com/221/. Radom Number. Used with permissio uder Creative

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Computers and Scientific Thinking

Computers and Scientific Thinking Computers ad Scietific Thikig David Reed, Creighto Uiversity Chapter 15 JavaScript Strigs 1 Strigs as Objects so far, your iteractive Web pages have maipulated strigs i simple ways use text box to iput

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

EFFICIENT MULTIPLE SEARCH TREE STRUCTURE

EFFICIENT MULTIPLE SEARCH TREE STRUCTURE EFFICIENT MULTIPLE SEARCH TREE STRUCTURE Mohammad Reza Ghaeii 1 ad Mohammad Reza Mirzababaei 1 Departmet of Computer Egieerig ad Iformatio Techology, Amirkabir Uiversity of Techology, Tehra, Ira mr.ghaeii@aut.ac.ir

More information

CS200: Hash Tables. Prichard Ch CS200 - Hash Tables 1

CS200: Hash Tables. Prichard Ch CS200 - Hash Tables 1 CS200: Hash Tables Prichard Ch. 13.2 CS200 - Hash Tables 1 Table Implemetatios: average cases Search Add Remove Sorted array-based Usorted array-based Balaced Search Trees O(log ) O() O() O() O(1) O()

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

BOOLEAN MATHEMATICS: GENERAL THEORY

BOOLEAN MATHEMATICS: GENERAL THEORY CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 18 Strategies for Query Processig Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio DBMS techiques to process a query Scaer idetifies

More information

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov

Sorting in Linear Time. Data Structures and Algorithms Andrei Bulatov Sortig i Liear Time Data Structures ad Algorithms Adrei Bulatov Algorithms Sortig i Liear Time 7-2 Compariso Sorts The oly test that all the algorithms we have cosidered so far is compariso The oly iformatio

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

CHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs

CHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs CHAPTER IV: GRAPH THEORY Sectio : Itroductio to Graphs Sice this class is called Number-Theoretic ad Discrete Structures, it would be a crime to oly focus o umber theory regardless how woderful those topics

More information

Economical Structure for Multi-feature Music Indexing 1

Economical Structure for Multi-feature Music Indexing 1 Proceedigs of the Iteratioal MultiCoferece of Egieers ad Computer Scietists 2008 Vol I IMECS 2008, 19-21 March, 2008, Hog Kog Ecoomical Structure for Multi-feature Music Idexig 1 Yu-Lug Lo, ad Chu-Hsiug

More information

Counting the Number of Minimum Roman Dominating Functions of a Graph

Counting the Number of Minimum Roman Dominating Functions of a Graph Coutig the Number of Miimum Roma Domiatig Fuctios of a Graph SHI ZHENG ad KOH KHEE MENG, Natioal Uiversity of Sigapore We provide two algorithms coutig the umber of miimum Roma domiatig fuctios of a graph

More information

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk

More information

1 Graph Sparsfication

1 Graph Sparsfication CME 305: Discrete Mathematics ad Algorithms 1 Graph Sparsficatio I this sectio we discuss the approximatio of a graph G(V, E) by a sparse graph H(V, F ) o the same vertex set. I particular, we cosider

More information

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Y.K. Patil* Iteratioal Joural of Advaced Research i ISSN: 2278-6244 IT ad Egieerig Impact Factor: 4.54 HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Prof. V.S. Nadedkar** Abstract: Documet clusterig is

More information

ECE4050 Data Structures and Algorithms. Lecture 6: Searching

ECE4050 Data Structures and Algorithms. Lecture 6: Searching ECE4050 Data Structures ad Algorithms Lecture 6: Searchig 1 Search Give: Distict keys k 1, k 2,, k ad collectio L of records of the form (k 1, I 1 ), (k 2, I 2 ),, (k, I ) where I j is the iformatio associated

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations Applied Mathematical Scieces, Vol. 1, 2007, o. 25, 1203-1215 A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045, Oe

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

A Parallel DFA Minimization Algorithm

A Parallel DFA Minimization Algorithm A Parallel DFA Miimizatio Algorithm Ambuj Tewari, Utkarsh Srivastava, ad P. Gupta Departmet of Computer Sciece & Egieerig Idia Istitute of Techology Kapur Kapur 208 016,INDIA pg@iitk.ac.i Abstract. I this

More information

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 10 Defiig Classes Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 10.1 Structures 10.2 Classes 10.3 Abstract Data Types 10.4 Itroductio to Iheritace Copyright 2015 Pearso Educatio,

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

Fuzzy Rule Selection by Data Mining Criteria and Genetic Algorithms

Fuzzy Rule Selection by Data Mining Criteria and Genetic Algorithms Fuzzy Rule Selectio by Data Miig Criteria ad Geetic Algorithms Hisao Ishibuchi Dept. of Idustrial Egieerig Osaka Prefecture Uiversity 1-1 Gakue-cho, Sakai, Osaka 599-8531, JAPAN E-mail: hisaoi@ie.osakafu-u.ac.jp

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 11. Friends, Overloaded Operators, and Arrays in Classes. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 11 Frieds, Overloaded Operators, ad Arrays i Classes Copyright 2014 Pearso Addiso-Wesley. All rights reserved. Overview 11.1 Fried Fuctios 11.2 Overloadig Operators 11.3 Arrays ad Classes 11.4

More information

Primitive polynomials selection method for pseudo-random number generator

Primitive polynomials selection method for pseudo-random number generator Joural of hysics: Coferece Series AER OEN ACCESS rimitive polyomials selectio method for pseudo-radom umber geerator To cite this article: I V Aiki ad Kh Alajjar 08 J. hys.: Cof. Ser. 944 0003 View the

More information

ANN WHICH COVERS MLP AND RBF

ANN WHICH COVERS MLP AND RBF ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

Cubic Polynomial Curves with a Shape Parameter

Cubic Polynomial Curves with a Shape Parameter roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad

More information

Speeding-up dynamic programming in sequence alignment

Speeding-up dynamic programming in sequence alignment Departmet of Computer Sciece Aarhus Uiversity Demark Speedig-up dyamic programmig i sequece aligmet Master s Thesis Dug My Hoa - 443 December, Supervisor: Christia Nørgaard Storm Pederse Implemetatio code

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology

More information

Computer Science Foundation Exam. August 12, Computer Science. Section 1A. No Calculators! KEY. Solutions and Grading Criteria.

Computer Science Foundation Exam. August 12, Computer Science. Section 1A. No Calculators! KEY. Solutions and Grading Criteria. Computer Sciece Foudatio Exam August, 005 Computer Sciece Sectio A No Calculators! Name: SSN: KEY Solutios ad Gradig Criteria Score: 50 I this sectio of the exam, there are four (4) problems. You must

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

arxiv: v2 [cs.ds] 24 Mar 2018

arxiv: v2 [cs.ds] 24 Mar 2018 Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves

More information

New HSL Distance Based Colour Clustering Algorithm

New HSL Distance Based Colour Clustering Algorithm The 4th Midwest Artificial Itelligece ad Cogitive Scieces Coferece (MAICS 03 pp 85-9 New Albay Idiaa USA April 3-4 03 New HSL Distace Based Colour Clusterig Algorithm Vasile Patrascu Departemet of Iformatics

More information

Σ P(i) ( depth T (K i ) + 1),

Σ P(i) ( depth T (K i ) + 1), EECS 3101 York Uiversity Istructor: Ady Mirzaia DYNAMIC PROGRAMMING: OPIMAL SAIC BINARY SEARCH REES his lecture ote describes a applicatio of the dyamic programmig paradigm o computig the optimal static

More information

Neural Networks A Model of Boolean Functions

Neural Networks A Model of Boolean Functions Neural Networks A Model of Boolea Fuctios Berd Steibach, Roma Kohut Freiberg Uiversity of Miig ad Techology Istitute of Computer Sciece D-09596 Freiberg, Germay e-mails: steib@iformatik.tu-freiberg.de

More information

EE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 )

EE260: Digital Design, Spring /16/18. n Example: m 0 (=x 1 x 2 ) is adjacent to m 1 (=x 1 x 2 ) and m 2 (=x 1 x 2 ) but NOT m 3 (=x 1 x 2 ) EE26: Digital Desig, Sprig 28 3/6/8 EE 26: Itroductio to Digital Desig Combiatioal Datapath Yao Zheg Departmet of Electrical Egieerig Uiversity of Hawaiʻi at Māoa Combiatioal Logic Blocks Multiplexer Ecoders/Decoders

More information

Chapter 8. Strings and Vectors. Copyright 2014 Pearson Addison-Wesley. All rights reserved.

Chapter 8. Strings and Vectors. Copyright 2014 Pearson Addison-Wesley. All rights reserved. Chapter 8 Strigs ad Vectors Overview 8.1 A Array Type for Strigs 8.2 The Stadard strig Class 8.3 Vectors Slide 8-3 8.1 A Array Type for Strigs A Array Type for Strigs C-strigs ca be used to represet strigs

More information

Heuristic Approaches for Solving the Multidimensional Knapsack Problem (MKP)

Heuristic Approaches for Solving the Multidimensional Knapsack Problem (MKP) Heuristic Approaches for Solvig the Multidimesioal Kapsack Problem (MKP) R. PARRA-HERNANDEZ N. DIMOPOULOS Departmet of Electrical ad Computer Eg. Uiversity of Victoria Victoria, B.C. CANADA Abstract: -

More information

On (K t e)-saturated Graphs

On (K t e)-saturated Graphs Noame mauscript No. (will be iserted by the editor O (K t e-saturated Graphs Jessica Fuller Roald J. Gould the date of receipt ad acceptace should be iserted later Abstract Give a graph H, we say a graph

More information

A New Bit Wise Technique for 3-Partitioning Algorithm

A New Bit Wise Technique for 3-Partitioning Algorithm Special Issue of Iteratioal Joural of Computer Applicatios (0975 8887) o Optimizatio ad O-chip Commuicatio, No.1. Feb.2012, ww.ijcaolie.org A New Bit Wise Techique for 3-Partitioig Algorithm Rajumar Jai

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a

n n B. How many subsets of C are there of cardinality n. We are selecting elements for such a 4. [10] Usig a combiatorial argumet, prove that for 1: = 0 = Let A ad B be disjoit sets of cardiality each ad C = A B. How may subsets of C are there of cardiality. We are selectig elemets for such a subset

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

Stone Images Retrieval Based on Color Histogram

Stone Images Retrieval Based on Color Histogram Stoe Images Retrieval Based o Color Histogram Qiag Zhao, Jie Yag, Jigyi Yag, Hogxig Liu School of Iformatio Egieerig, Wuha Uiversity of Techology Wuha, Chia Abstract Stoe images color features are chose

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

ISSN (Print) Research Article. *Corresponding author Nengfa Hu

ISSN (Print) Research Article. *Corresponding author Nengfa Hu Scholars Joural of Egieerig ad Techology (SJET) Sch. J. Eg. Tech., 2016; 4(5):249-253 Scholars Academic ad Scietific Publisher (A Iteratioal Publisher for Academic ad Scietific Resources) www.saspublisher.com

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

GPUMP: a Multiple-Precision Integer Library for GPUs

GPUMP: a Multiple-Precision Integer Library for GPUs GPUMP: a Multiple-Precisio Iteger Library for GPUs Kaiyog Zhao ad Xiaowe Chu Departmet of Computer Sciece, Hog Kog Baptist Uiversity Hog Kog, P. R. Chia Email: {kyzhao, chxw}@comp.hkbu.edu.hk Abstract

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Computer Systems - HS

Computer Systems - HS What have we leared so far? Computer Systems High Level ENGG1203 2d Semester, 2017-18 Applicatios Sigals Systems & Cotrol Systems Computer & Embedded Systems Digital Logic Combiatioal Logic Sequetial Logic

More information

Chapter 8. Strings and Vectors. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 8. Strings and Vectors. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 8 Strigs ad Vectors Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 8.1 A Array Type for Strigs 8.2 The Stadard strig Class 8.3 Vectors Copyright 2015 Pearso Educatio, Ltd..

More information

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure

More information

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS

APPLICATION NOTE PACE1750AE BUILT-IN FUNCTIONS APPLICATION NOTE PACE175AE BUILT-IN UNCTIONS About This Note This applicatio brief is iteded to explai ad demostrate the use of the special fuctios that are built ito the PACE175AE processor. These powerful

More information

Appendix D. Controller Implementation

Appendix D. Controller Implementation COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Appedix D Cotroller Implemetatio Cotroller Implemetatios Combiatioal logic (sigle-cycle); Fiite state machie (multi-cycle, pipelied);

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

Analysis of Algorithms

Analysis of Algorithms Presetatio for use with the textbook, Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 2015 Aalysis of Algorithms Iput 2015 Goodrich ad Tamassia Algorithm Aalysis of Algorithms

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

Analysis of Documents Clustering Using Sampled Agglomerative Technique

Analysis of Documents Clustering Using Sampled Agglomerative Technique Aalysis of Documets Clusterig Usig Sampled Agglomerative Techique Omar H. Karam, Ahmed M. Hamad, ad Sheri M. Moussa Abstract I this paper a clusterig algorithm for documets is proposed that adapts a samplig-based

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information

COMP Parallel Computing. PRAM (1): The PRAM model and complexity measures

COMP Parallel Computing. PRAM (1): The PRAM model and complexity measures COMP 633 - Parallel Computig Lecture 2 August 24, 2017 : The PRAM model ad complexity measures 1 First class summary This course is about parallel computig to achieve high-er performace o idividual problems

More information

A Generalized Set Theoretic Approach for Time and Space Complexity Analysis of Algorithms and Functions

A Generalized Set Theoretic Approach for Time and Space Complexity Analysis of Algorithms and Functions Proceedigs of the 10th WSEAS Iteratioal Coferece o APPLIED MATHEMATICS, Dallas, Texas, USA, November 1-3, 2006 316 A Geeralized Set Theoretic Approach for Time ad Space Complexity Aalysis of Algorithms

More information

1.2 Binomial Coefficients and Subsets

1.2 Binomial Coefficients and Subsets 1.2. BINOMIAL COEFFICIENTS AND SUBSETS 13 1.2 Biomial Coefficiets ad Subsets 1.2-1 The loop below is part of a program to determie the umber of triagles formed by poits i the plae. for i =1 to for j =

More information

High Availability with Diagonal Replication in 2D Mesh (DR2M) Protocol for Grid Environment

High Availability with Diagonal Replication in 2D Mesh (DR2M) Protocol for Grid Environment High Availability with Diagoal Replicatio i 2D Mesh (DR2M) Protocol for Grid Eviromet Rohaya Latip (Correspodig author) Faculty of Computer Sciece ad Iformatio Techology Uiversiti Putra Malaysia Tel: 60-3-8946-6536

More information

Big-O Analysis. Asymptotics

Big-O Analysis. Asymptotics Big-O Aalysis 1 Defiitio: Suppose that f() ad g() are oegative fuctios of. The we say that f() is O(g()) provided that there are costats C > 0 ad N > 0 such that for all > N, f() Cg(). Big-O expresses

More information

Keywords Software Architecture, Object-oriented metrics, Reliability, Reusability, Coupling evaluator, Cohesion, efficiency

Keywords Software Architecture, Object-oriented metrics, Reliability, Reusability, Coupling evaluator, Cohesion, efficiency Volume 3, Issue 9, September 2013 ISSN: 2277 128X Iteratioal Joural of Advaced Research i Computer Sciece ad Software Egieerig Research Paper Available olie at: www.ijarcsse.com Couplig Evaluator to Ehace

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS

AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Melisa Hajyvahabzadeh

More information

CSE 2320 Notes 8: Sorting. (Last updated 10/3/18 7:16 PM) Idea: Take an unsorted (sub)array and partition into two subarrays such that.

CSE 2320 Notes 8: Sorting. (Last updated 10/3/18 7:16 PM) Idea: Take an unsorted (sub)array and partition into two subarrays such that. CSE Notes 8: Sortig (Last updated //8 7:6 PM) CLRS 7.-7., 9., 8.-8. 8.A. QUICKSORT Cocepts Idea: Take a usorted (sub)array ad partitio ito two subarrays such that p q r x y z x y y z Pivot Customarily,

More information

Heaps. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015

Heaps. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 201 Heaps 201 Goodrich ad Tamassia xkcd. http://xkcd.com/83/. Tree. Used with permissio uder

More information

BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM

BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM MATEC Web of Cofereces 79, 01014 (016) DOI: 10.1051/ mateccof/0167901014 T 016 BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM Staislav Shidlovskiy 1, 1 Natioal Research

More information

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence _9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

Data Structures and Algorithms. Analysis of Algorithms

Data Structures and Algorithms. Analysis of Algorithms Data Structures ad Algorithms Aalysis of Algorithms Outlie Ruig time Pseudo-code Big-oh otatio Big-theta otatio Big-omega otatio Asymptotic algorithm aalysis Aalysis of Algorithms Iput Algorithm Output

More information

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits Egieerig Letters, :, EL Reversible Realizatio of Quaterary Decoder, Multiplexer, ad Demultiplexer Circuits Mozammel H.. Kha, Member, ENG bstract quaterary reversible circuit is more compact tha the correspodig

More information

COP4020 Programming Languages. Functional Programming Prof. Robert van Engelen

COP4020 Programming Languages. Functional Programming Prof. Robert van Engelen COP4020 Programmig Laguages Fuctioal Programmig Prof. Robert va Egele Overview What is fuctioal programmig? Historical origis of fuctioal programmig Fuctioal programmig today Cocepts of fuctioal programmig

More information

Switch Construction CS

Switch Construction CS Switch Costructio CS 00 Workstatio-Based Aggregate badwidth /2 of the I/O bus badwidth capacity shared amog all hosts coected to switch example: Gbps bus ca support 5 x 00Mbps ports (i theory) I/O bus

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

A Novel Feature Extraction Algorithm for Haar Local Binary Pattern Texture Based on Human Vision System

A Novel Feature Extraction Algorithm for Haar Local Binary Pattern Texture Based on Human Vision System A Novel Feature Extractio Algorithm for Haar Local Biary Patter Texture Based o Huma Visio System Liu Tao 1,* 1 Departmet of Electroic Egieerig Shaaxi Eergy Istitute Xiayag, Shaaxi, Chia Abstract The locality

More information