A Caching Algorithm using Evolutionary Game Theory in a File-Sharing System

Size: px
Start display at page:

Download "A Caching Algorithm using Evolutionary Game Theory in a File-Sharing System"

Transcription

1 A Caching Algoithm using Evolutionay Game Theoy in a File-Shaing System Masahio Sasabe Cybemedia Cente Osaka Univesity 1-32 Machikaneyama-cho, Toyonaka-shi Osaka 56-43, Japan m-sasabe@cmc.osaka-u.ac.jp Naoki Wakamiya, Masayuki Muata Gad. School of Infomation Science and Technology Osaka Univesity 1-5 Yamadaoka, Suita-shi Osaka , Japan {wakamiya, muata}@ist.osaka-u.ac.jp Abstact In a P2P file-shaing system, a node finds and etieves its desied file. If multiple nodes cache the same file to povide othes, we can achieve a file-shaing system with low latency and high file availability. Howeve, a node has to spend costs, e.g., pocessing load o stoage capacity, on caching of a file. Consequently, a node may selfishly behave and hesitate to cache a file. In such a case, thee is a possibility that unpopula files disappea fom the system. In this pape, we aim to accomplish effective caching in the whole system that emeges fom autonomous and selfish node behavio. We fist discuss elationship between selfish node behavio and system dynamics accoding to evolutionay game theoy. As a esult, we show that a file-shaing system can be obust to file disappeaance depending on a cost and demand model fo caching even if nodes behave selfishly. 1. Intoduction In a Pee-to-Pee (P2P) file-shaing system, a node exchanges infomation and files with othe nodes on a logical netwok that the nodes constuct by establishing a logical link between two nodes. Each node caches its oiginal o etieved files into a local stoage to shae them with othe nodes. If multiple nodes coopeatively cache an identical file into thei stoages, a node can find it with highe pobability and etieve it moe quickly. This leads to enhance pefomance, availability, and eliability of the system [6, 11]. Howeve, caching of a file incus costs such as pocessing load and stoage capacity. A node consisting of the fileshaing system selfishly behaves because it is pimitively a use teminal. As a esult, some nodes may not be coopeative to cache files [3]. In such a situation, thee is a poblem that a node cannot use a file due to disappeaance caused by its unpopulaity. It is difficult fo a system administato to monito and manage all nodes so that the system achieves effective caching. Thus, it is desiable that selfish and autonomous node behavio leads to effective caching in the whole system. Game theoy can eveal how the selfish node behavio affects dynamics of the whole system [5, 1]. In Ref. [5], they assume that a node behaves to minimize its own costs fo using a file. The costs ae stoage capacity consumed by caching and latency to etieve a file fom its coesponding file holde, i.e., povide. Then, they pove that Nash equilibia, namely stable states of a system, exist in such a situation by using game theoy. Futhemoe, they show an optimum state of the system is equal to one of the Nash equilibia by intoducing a payment model in which a node can obtain payments to cache a file fom othe nodes that etieve the cache file. On the othe hand, in Ref. [1], they discuss coopeative node behavio in a file-shaing system unde the famewok of Multi-Peson Pisone s Dilemma. If thee is no incentive fo caching a file, all nodes become fee-ides in a Nash equilibium. Though analyses and simulation evaluations, they pesent that a node intends to contibute to caching if it can obtain payments o eputations fom othe nodes in compensation fo caching a file. Although these studies eveal how selfish node behavio affects the system pefomance in a Nash equilibium, they insist that incentive mechanisms, e.g., payments o eputations fom othe nodes, ae essential to achieve coopeative caching. Howeve, such incentive mechanisms ae not necessaily applied to a file-shaing system. Fo example, thee is a file-shaing system that hides a povide fom nodes equesting the coesponding file so as to impove the anonymity among nodes. In such a system, it is difficult fo a povide to obtain payments fom the equesting nodes. In this pape, we focus on a moe geneal file-shaing system without such incentive mechanisms. We aim to accomplish effective caching in the whole system that emeges fom selfish and autonomous node behavio taking into account its demand and cost fo caching. Fo this pupose,

2 we use evolutionay game theoy to examine how local inteaction between selfish nodes affects the dynamics of the whole system [7]. In a society of oganisms, vaious individuals influence each othe. Evolutionay game theoy oiginally ties to figue out a mechanism in which optimum behavio comes down to offsping in evolutionay pocess of oganisms by using game theoy. Suppose that individual behavio defined by genes is a stategy of game theoy and the numbe of offsping following cetain behavio is payoffs acquied by the coesponding stategy. In such a case, vaious individuals ae in stategically mutual dependence elation of game theoy. Thus, by using game theoy, we can explain the phenomenon that supeio behavio speads ove a society of oganisms though inheitance fom ancestos to offsping. Fo example, many eseaches focus on how individual behavio that seems to be selfish and uncoopeative affects the emegence of coopeative phenomena in the whole society [7, 9, 12]. We expect that evolutionay game theoy can also eveal how much selfish node behavio based on local inteaction has impact on caching condition in the whole system. In this pape, we deive the elationship between node behavio and the numbe of cache files in a stable state of the whole system by using eplicato dynamics and agent-based dynamics of evolutionay game theoy. Then, we examine effective caching in the whole system that emeges fom selfish node behavio. Replicato dynamics and agent-based dynamics ae models to deive a stategy distibution in an evolutionay stable state. Replicato dynamics is a mathematical model in which a stategy inceases when it can yield moe payoffs than aveage payoffs of all stategies. Note that eplicato dynamics can be applicable when the numbe of individuals composed of the society is elatively lage and the netwok among the individuals is mean-field like. As a esult, we can obtain the system chaacteistics in the case that a node selfishly behaves in accodance with global infomation on caching condition in a full mesh netwok. On the othe hand, agent-based dynamics models a phenomenon that a supeio stategy speads ove the netwok in a hop-by-hop manne. In agent-based dynamics, an individual plays a game once with all neighboing individuals, detemines supeioity of its own stategy based on the game esults, and finally decides the next stategy. Consequently, we can find out the system chaacteistics in the case that a node selfishly behaves based on its local infomation in vaious netwok topologies. In this pape, we fist make modeling a file-shaing system as a game taking into account cost and demand fo caching. Then, we theoetically deive the numbe of cache files in the whole system by eplicato dynamics when a node can obtain global infomation. Futhemoe, though simulation expeiments based on agent-based dynamics, we Table 1. payoff matix (geneal) playe 2 coopeato defecto playe 1 coopeato (R, R) (S, T ) defecto (T, S) (P, P ) evaluate the numbe of cache files and distance fom a node to a povide in the case that a node behaves accoding to its local infomation. Finally, we descibe an appopiate caching model to achieve effective caching fom the analyses and simulation esults. The est of the pape is oganized as follows. In section 2, we descibe models of caching games with which we deal in this pape. Then, we evaluate the system chaacteistics by eplicato dynamics in section 3 and by agentbased dynamics in section 4. Fom the esults, we examine whethe the models ae suited to effective caching. Finally, section 5 gives conclusions and futue wok. 2. Caching Game In evolutionay game theoy, a game between two abitay playes is defined as a pay-off matix as shown in Tab. 1. A defecto exploiting a coopeato gets T and the exploited coopeato eceives S. Both playes eceives R (P ) when they coopeate (defect) each othe. Pisone s Dilemma Game (T > R > P > S) and SnowDift Game (T > R > S > P ) ae examples of well-known games. In this pape, we fist model caching in a file-shaing system as a caching game between two neighboing nodes. If thee is no capacity limit on nodes that esults in no competition of stoage capacity among diffeent files, we can assume that the caching is composed of multiple sepaated caching games each of which deals with a single file. In what follows, we define caching games fo a single file fo sake of simplicity. Fo the single file caching, each node has two stategies: caching o no caching. Since a node satisfies its demand to the file by leveaging the file, we egad the benefit obtained by the use of the file as its demand b. On the othe hand, a node has to spend a cost on caching a file. In this pape, we investigate two kinds of costs: pocessing load c l caused by self o othe node s access to a file and stoage capacity c s consumed by caching a file. As futue wok, we plan to conside dynamic costs, e.g., netwok bandwidth o delay equied to etieve a file fom a povide. We do not conside the incentive mechanisms fo caching [5, 1] because we assume a geneal file-shaing system in this pape. In the case that the cost is the pocessing load, the paametes of payoff matix become R = b c l, T = b, S = b 2c l, P = (Tab. 2). Note that b 2c l is geate than. Since the elationship among paametes of Tab. 2 sat-

3 Table 2. payoff matix (caching game, cost: load) playe 2 caching no caching playe 1 caching (b c l, b c l ) (b 2c l, b) no caching (b, b 2c l ) (,) Table 3. payoff matix (caching game, cost: stoage) playe playe 1 2 caching no caching caching (b c s, b c s ) (b c s, b) no caching (b, b c s ) (,) isfies T > R > S > P, Tab. 2 is the same as SnowDift Game. On the contay, we obtain R = b c l, T = b, S = b c l, P = in the case that the cost is the stoage capacity (Tab. 3). Note that b c s is geate than. Tab. 3 holds T > R = S > P and does not coespond to any kind of existing games. In the succeeding sections, we exploe how the numbe of nodes caching a file, that is the numbe of nodes taking the stategy caching, changes in accodance with the paametes of payoff matix and examine the ealization of a file-shaing system with high file availability. 3. Theoetical Analysis by Replicato Dynamics In this section, we theoetically deive the elationship between the paamete settings in Tabs. 2 and 3 and the numbe of nodes caching a file in a stable state of a fileshaing system by eplicato dynamics [7]. If the payoff matix can enfoce moe nodes to take the stategy caching, we can enhance the file availability of the file-shaing system composed of nodes that selfishly behave based on the payoff matix Replicato Dynamics The basic concept of eplicato dynamics is that the gowth ate of nodes taking a stategy is popotional to the payoff acquied by the stategy. Thus, the stategy that yields moe payoff than aveage payoff of the whole system inceases, and vice vesa. Note that eplicato dynamics assumes that an node plays a game with all othe nodes. In what follows, we explain the deivation pocess of eplicato dynamics in a geneal game descibed as Tab. 1. Suppose that the atio of coopeatos at a cetain time is x and that of defectos is 1 x. The aveage payoff of coopeatos becomes On the contay, that of defectos is Rx + S(1 x). (1) T x + P (1 x). (2) Consequently, the aveage payoff of the whole nodes can be deived as follows: x(rx + S(1 x)) + (1 x)(t x + P (1 x)). (3) The payoff diffeence between the aveage payoff of coopeatos and that of the whole nodes is expessed as {Rx + S(1 x)} {x(rx + S(1 x)) + (1 x)(t x + P (1 x))} = {(R + P T S)x + S P }(1 x). (4) Finally, eplicato dynamics ẋ that indicates the tansition of x is defined as follows: ẋ = {(R + P T S)x + S P }(1 x)x. (5) 3.2. The Numbe of Cache Files in a Stable State The equilibia of x that satisfy ẋ = ae, 1, and R+P T S. Next, we descibe the stability of thei equilibia. In Eq. (5), (1 x)x is constantly ove zeo fo x 1. The emaining pat (R + P T S)x + S P becomes positive fo x < R+P T S and negative fo x > R+P T S because of the definition of games in section 2. As a esult, x appoaches to R+P T S independently of the initial value of x. Thus, the stable equilibium is P S x = R + P T S. (6) Eq. (6) indicates that the atio of coopeatos at a stable state depends on the paametes of the payoff matix. Based on Refs. [9, 12, 8], we fist define as the cost-tobenefit atio of mutual coopeation. means a isk that a node should take when it behaves as a coopeato. anges (,1]. The smalle value of indicates that coopeatos incease. In this pape, is detemined by b and c l o by b and c s. Theefoe, can be egaded as the atio of demand to cost fo caching. If the cost is the pocessing load, fom Eq. (6) and Tab. 2, the atio x of coopeatos at a stable state becomes x = b 2c l. (7) b c l On the othe hand, the cost-to-benefit atio of mutual coopeation is as follows: c l =. (8) b c l

4 Finally, the elationship between x and satisfies x = 1. (9) We can also deive the elationship between x and in the case whee the cost is the stoage capacity as follows: 1 x = 1 +. (1) Fom Eqs. (9) and (1), the atio x of coopeatos deteioates with the incease of the, namely the decease of the demand b to the file, independently of the cost models. In this pape, we aim to achieve a file-shaing system with high file-availability that is obust to file disappeaance. If the cost is the pocessing load, Eq. (9) denotes that a file disappeas fom the system when is close to 1 that means the demand to the file is low. On the othe hand, the cost model of the stoage capacity enhances the file availability by peventing x falling in even if is Simulation-based Analysis by Agent-based Dynamics Agent-based dynamics [7] can eveal how much caching based on local inteaction among neighboing nodes has impact on the numbe of cache files in the whole system. Moeove, we can evaluate seach latency fo a file since we can obtain the stategies of all nodes, namely the locations of cache files Agent-based Dynamics In agent-based dynamics, a node detemines its stategy by compaing its own payoff with that of a neighboing node. A node initially selects a stategy at andom. The initial atio of coopeatos and that of defectos ae fifty-fifty in Refs. [8, 9, 12]. Once a node i detemines its stategy, it plays a game once with all neighboing nodes. This is one geneation. At the end of the geneation, the node i calculates aveage A i of payoffs acquied, then detemines the stategy of the next geneation as follows. Step 1: Selection of a neighboing node fo compaison of payoffs The node i andomly chooses a node j fom neighboing nodes. Step 2: Decision of the next stategy based on the compaison of aveage payoffs If A j > A i is satisfied, the node i imitates the stategy of node j with the following pobability: P A (i, j) = A j A i T P. (11) Othewise, it does not change its stategy. The node i tends to imitate the stategy of a node that obtained Table 4. maximum hop count between two abitay nodes m = 2 m = 4 scale-fee netwok andom netwok moe payoffs than it. In addition, P A inceases in popotion to the payoff diffeence. In an actual system, we should conside the oveheads incued by playing games and exchanging payoff with neighboing nodes. We expect that these pocesses can be ealized by applying the keep-alive messaging as in Gnutella with slight modifications Simulation Expeiments Though seveal simulation expeiments, we evaluate how node behavio based on the payoff matix affects file availability and seach latency of the whole system in scalefee and andom netwoks. We evaluate the file availability by the atio x of nodes taking the stategy caching. In the case of single-file caching, the numbe of cache files is the same as the poduct of x and the numbe of nodes. On the othe hand, we define the seach latency as the aveage hop count between a node to its closest povide including itself. Note that we altenatively use the maximum hop count between two abitay nodes when a file disappeas fom the system Simulation Model. We used NetLogo [2] in ou simulation expeiments. Based on Refs. [8, 9, 12], we set simulation configuations as follows. We geneated scale-fee and andom netwoks of 1 nodes by using the topology geneato BRITE [1]. The scale-fee netwok was based on Baabási-Albet (BA) model [4] and the andom netwok followed waxman algoithm [13] with α =.15 and β =.2. We also set the numbe m of connections that a newly paticipating node established to 2 and 4. Table 4 epesents the aveage of maximum hop count between two abitay nodes in twenty netwoks. We set the caching costs c l and c s to 1, espectively. Thus, independently of the cost models, b = 1+ was deived. We configued that the initial atio of stategy caching and that of stategy no caching wee fifty-fifty. To investigate the system chaacteistics in a stable state, we show esults when 1 geneations passed. The following esults indicate the aveage of twenty simulations. We abbeviate eplicato dynamics to RD, agent-based dynamics to AD, scale-fee to SF, and andom to RND in the following figues Impact of Payoff Matix. Figue 1(a) illustates that the elationship between and the atio x of nodes taking

5 1 4.5 x AD (load).2 AD (stoage) RD (load) RD (stoage) hop count to the closest povide AD (load) AD (stoage) (a) faction of coopeatos (b) hop count to the closest povide Figue 1. payoff matix vs. file availability and seach latency (scale-fee: m=4) the stategy caching that is deived by agent-based dynamics in a scale-fee netwok with m = 4. We discove that x deteioates with the incease of, namely the decease of demand, egadless of the cost models. In addition, the cost model of pocessing load causes the disappeaance of files with lage. On the othe hand, the file availability is enhanced by using the cost model of stoage capacity even if is 1. Next, Fig. 1(a) also shows x deived by eplicato dynamics. If the cost is the pocessing load, x of agent-based dynamics is lowe than that of eplicato dynamics excluding the case of smalle. On the contay, the cost model of stoage capacity enhances the file availability as x of agent-based dynamics achieves almost the same as that of eplicato dynamics. Figue 1(b) depicts that the seach latency inceases with the gowth of, independently of the cost models. This is because the numbe of povides deceases as shown in Fig. 1(a). In the case that the cost is the stoage capacity, x is highe than.4 even fo a low-demand file. Consequently, a node can educe the seach latency by finding out a close povide Impact of Netwok Stuctue. Figue 2 illustates x and the seach latency in scale-fee netwoks with m = 2, 4. Since the aveage degee is 2m, lage m makes a netwok dense. Figue 2(a) shows that smalle m pomotes to incease high-demand files, independently of the cost models. This is due to the effect of high degee nodes. A high degee node tends to acquie moe payoffs than othe nodes and be chosen fo compaison of payoffs by its neighboing nodes. As a esult, the stategy of a high degee node is likely to spead ove the netwok. The impact of high degee nodes is acceleated in a netwok with small m whee low degee nodes fequently exist. On the othe hand, Fig. 2(b) pesents that the seach latency of m = 2 is lowe than that of m = 4 if is smalle than.3 in the cost model of pocessing load and.5 in the cost model of stoage capacity. This is because files with smalle ae moe cached in the case of m = 2 as shown in Fig. 2(a). Since the incease of esults in the decease of povides, the seach latency of m = 4 becomes supeio to that of m = 2. Note that thee is slight diffeence between m = 2 and m = 4 in the cost model of stoage capacity. Figue 2 also shows that x and the seach latency in the andom netwok with m = 4. We find that x in the scalefee netwok is mainly lage than that in the andom netwok as shown in Fig. 2(a). Contay to ou expectation, Fig. 2(b) pesents that the seach latency in the scale-fee netwok is not so supeio to that in the andom netwok despite of its lowe diamete of the netwok (Tab. 4). This is because files tend to be cached at egula nodes athe than high degee nodes in the scale-fee netwok. In othe wods, we can alleviate load concentation on high degee nodes while suppessing the seach latency. Note that the diffeence of degee distibution does not so much affect to the seach latency if the cost is the stoage capacity. In summay, we can accomplish a file-shaing system with high file-availability and low seach-latency by using the cost model of stoage capacity independently of the netwok stuctues. 5. Conclusions In this pape, we evealed the elationship between node behavio and effective caching in the whole system by evolutionay game theoy so as to accomplish a file-shaing system with high file availability and low seach latency even if nodes behaved selfishly and autonomously. We fist made modeling a file-shaing system as two kinds of caching games between two neighboing nodes. Then, we

6 1 4.5 x load, SF (m=2) load, SF (m=4) load, RND (m=4).2 stoage, SF (m=2) stoage, SF (m=4) stoage, RND (m=4) hop count to the closest povide load, SF (m=2) load, SF (m=4) load, RND (m=4) stoage, SF (m=2) stoage, SF (m=4) stoage, RND (m=4) (a) faction of coopeatos (b) hop count to the closest povide Figue 2. impact of netwok stuctue (m=2 vs. m=4, scale-fee vs. andom) showed the basic chaacteistics of the models by analytically deiving the numbe of cache files in the system based on eplicato dynamics. Futhemoe, though simulation expeiments based on agent-based dynamics, we evaluated how much local node behavio had impact on the system pefomance. Simulation esults showed that modeling the cost fo caching as the stoage capacity made a file-shaing system obust to fie disappeaance independently of the netwok stuctues even if nodes behave selfishly. As futue eseach wok, we should examine a caching game that takes into account combination of multiple costs including dynamic costs, e.g., delay and bandwidth. Futhemoe, we plan to analyze the dynamics of infomation netwoks othe than the file-shaing system and popose contol mechanisms based on the analysis. Fo example, infomation tavels along a chain of intemediate nodes towad its destination in the following infomation systems: infomation distibution on an ovelay netwok, e.g., application level multicast, and infomation diffusion and gatheing on a senso netwok. Since fowading infomation takes costs, such as netwok bandwidth and electicity consumption, an effective fowading mechanism taking into account the significance of infomation is needed. Evolutionay game theoy can eveal node behavio suitable fo such effective infomation tansfe. Acknowledgement This eseach was suppoted by a Gant-in-Aid fo Young Scientists (B) and New Infomation Technologies fo Building a Netwoked Symbiosis Envionment of The 21st Centuy Cente of Excellence Pogam of the Ministy of Education, Cultue, Spots, Science and Technology in Japan. Refeences [1] BRITE. available at bite/. [2] NetLogo. available at edu/netlogo/. [3] E. Ada and B. A. Hubeman. Fee Riding on Gnutella. Technical Repot Xeox PARC, 2. [4] A.-L. Baabási and R. Albet. Emegence of Scaling in Random Netwoks. Science, 286, [5] B.-G. Chun, K. Chaudhui, H. Wee, M. Baeno, C. H. Papadimitiou, and J. Kubiatowicz. Selfish Caching in Distibuted Systems: A Game-Theoetic Analysis. In Poceedings of PODC 24, pages 21 3, Aveio, July 24. [6] K. P. Gummadi, R. J. Dunn, S. Saoiu, S. D. Gibble, H. M. Levy, and J. Zahojan. Measuement, Modeling, and Analysis of a Pee-to-Pee File-Shaing Wokload. In Poceedings of SOSP 23, pages , New Yok, Oct. 23. [7] S. Gyogy and F. Gabo. Evolutionay Games on Gaphs. AXiv Condensed Matte e-pints, July 26. [8] C. Hauet and M. Doebeli. Spatial Stuctue Often Inhibits The Evolution of Coopeation in The Snowdift Game. Natue, 428, 24. [9] J. M. Pacheco and F. C. Santos. Netwok Dependence of the Dilemmas of Coopeation. In Poceedings of CNET 24, pages 9 1, Aveio, Aug. 24. [1] K. Ranganathan, M. Ripeanu, A. Sain, and I. Foste. Incentive Mechanisms fo Lage Collaboative Resouce Shaing. In Poceedings of CCGRID 24, pages 1 8, Washington, DC, 24. [11] A. Rowston and P. Duschel. Stoage Management and Caching in PAST, a Lage-Scale, Pesistent Pee-to-Pee Stoage Utility. In Poceedings of SOSP 21, pages , New Yok, Oct. 21. [12] F. C. Santos and J. M. Pacheco. A New Route to the Evolution of Coopeation. Jounal of Evolutionay Biology, 19(3): , 26. [13] B. M. Waxman. Routing of Multipoint Connections. IEEE Jounal on Selected Aeas in Communications, 6(9): , Dec

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au

More information

Quality Aware Privacy Protection for Location-based Services

Quality Aware Privacy Protection for Location-based Services In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,

More information

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

FINITE ELEMENT MODEL UPDATING OF AN EXPERIMENTAL VEHICLE MODEL USING MEASURED MODAL CHARACTERISTICS

FINITE ELEMENT MODEL UPDATING OF AN EXPERIMENTAL VEHICLE MODEL USING MEASURED MODAL CHARACTERISTICS COMPDYN 009 ECCOMAS Thematic Confeence on Computational Methods in Stuctual Dynamics and Eathquake Engineeing M. Papadakakis, N.D. Lagaos, M. Fagiadakis (eds.) Rhodes, Geece, 4 June 009 FINITE ELEMENT

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

Hierarchical Peer-to-peer Systems

Hierarchical Peer-to-peer Systems Hieachical Pee-to-pee ystems L. Gacés-Eice 1, E.W. Biesack 1, P.A. Felbe 1, K.W. Ross 2, and G. Uvoy-Kelle 1 1 Institut EURECOM 06904 ophia Antipolis, Fance {gaces ebi felbe uvoy}@euecom.f 2 Polytechnic

More information

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

Annales UMCS Informatica AI 2 (2004) UMCS

Annales UMCS Informatica AI 2 (2004) UMCS Pobane z czasopisma Annales AI- Infomatica http://ai.annales.umcs.pl Annales Infomatica AI 2 (2004) 33-340 Annales Infomatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Embedding as a

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

The EigenRumor Algorithm for Ranking Blogs

The EigenRumor Algorithm for Ranking Blogs he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy

More information

Gravitational Shift for Beginners

Gravitational Shift for Beginners Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

Analysis of Wired Short Cuts in Wireless Sensor Networks

Analysis of Wired Short Cuts in Wireless Sensor Networks Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment

More information

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation A Minutiae-based Fingepint Matching Algoithm Using Phase Coelation Autho Chen, Weiping, Gao, Yongsheng Published 2007 Confeence Title Digital Image Computing: Techniques and Applications DOI https://doi.og/10.1109/dicta.2007.4426801

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2 Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used

More information

Monte Carlo Simulation for the ECAT HRRT using GATE

Monte Carlo Simulation for the ECAT HRRT using GATE Monte Calo Simulation fo the ECAT HRRT using GATE F. Bataille, C. Comtat, Membe, IEEE, S. Jan, and R. Tébossen Abstact The ECAT HRRT (High Resolution Reseach Tomogaph, CPS Innovations, Knoxville, TN, U.S.A.)

More information

Desired Attitude Angles Design Based on Optimization for Side Window Detection of Kinetic Interceptor *

Desired Attitude Angles Design Based on Optimization for Side Window Detection of Kinetic Interceptor * Poceedings of the 7 th Chinese Contol Confeence July 6-8, 008, Kunming,Yunnan, China Desied Attitude Angles Design Based on Optimization fo Side Window Detection of Kinetic Intecepto * Zhu Bo, Quan Quan,

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design

Transmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

Effects of Model Complexity on Generalization Performance of Convolutional Neural Networks

Effects of Model Complexity on Generalization Performance of Convolutional Neural Networks Effects of Model Complexity on Genealization Pefomance of Convolutional Neual Netwoks Tae-Jun Kim 1, Dongsu Zhang 2, and Joon Shik Kim 3 1 Seoul National Univesity, Seoul 151-742, Koea, E-mail: tjkim@bi.snu.ac.k

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Mobility Pattern Recognition in Mobile Ad-Hoc Networks

Mobility Pattern Recognition in Mobile Ad-Hoc Networks Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

High performance CUDA based CNN image processor

High performance CUDA based CNN image processor High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Modeling spatially-correlated data of sensor networks with irregular topologies

Modeling spatially-correlated data of sensor networks with irregular topologies This full text pape was pee eviewed at the diection of IEEE Communications Society subject matte expets fo publication in the IEEE SECON 25 poceedings Modeling spatially-coelated data of senso netwoks

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking Cyptanalysis of Hwang-Chang s a Time-Stamp Potocol fo Digital Watemaking *Jue-Sam Chou, Yalin Chen 2, Chung-Ju Chan 3 Depatment of Infomation Management, Nanhua Univesity Chiayi 622 Taiwan, R.O.C *: coesponding

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au

More information

Clustering Interval-valued Data Using an Overlapped Interval Divergence

Clustering Interval-valued Data Using an Overlapped Interval Divergence Poc. of the 8th Austalasian Data Mining Confeence (AusDM'9) Clusteing Inteval-valued Data Using an Ovelapped Inteval Divegence Yongli Ren Yu-Hsn Liu Jia Rong Robet Dew School of Infomation Engineeing,

More information

Experimental and numerical simulation of the flow over a spillway

Experimental and numerical simulation of the flow over a spillway Euopean Wate 57: 253-260, 2017. 2017 E.W. Publications Expeimental and numeical simulation of the flow ove a spillway A. Seafeim *, L. Avgeis, V. Hissanthou and K. Bellos Depatment of Civil Engineeing,

More information

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE 1 YAROSLAVTSEV A.F., 2 Al-THUNEIBAT S.A., 3 AL TAWALBEH N.A 1 Depatment of Netwoking, SSUTI, Novosibisk, Russia

More information

UCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j

UCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j UCLA Papes Title Localized Edge Detection in Senso Fields Pemalink https://escholashipog/uc/item/3fj6g58j Authos K Chintalapudi Govindan Publication Date 3-- Pee eviewed escholashipog Poweed by the Califonia

More information

Secure Collaboration in Mediator-Free Environments

Secure Collaboration in Mediator-Free Environments Secue Collaboation in Mediato-Fee Envionments Mohamed Shehab School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA shehab@pudueedu Elisa Betino Depatment of Compute Sciences

More information

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

Data mining based automated reverse engineering and defect discovery

Data mining based automated reverse engineering and defect discovery Data mining based automated evese engineeing and defect discovey James F. Smith III, ThanhVu H. Nguyen Naval Reseach Laboatoy, Code 5741, Washington, D.C., 20375-5000 ABSTRACT A data mining based pocedue

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

Loss-Cognizant Pricing in Feed-Forward Networks with Greedy Users

Loss-Cognizant Pricing in Feed-Forward Networks with Greedy Users Loss-Cognizant Picing in Feed-Fowad Netwoks with Geedy Uses Ashaf Al Daoud and Muat Alanyali Depatment of Electical and Compute Engineeing Boston Univesity, Boston, MA 02215 Email: {ashaf, alanyali}@bu.edu

More information

Extensive games with imperfect information

Extensive games with imperfect information Extensive games with impefect infomation ECON500 Advanced micoeconomics ectues in game theoy Fall 0, Pat 3 7.07.0 G.. Asheim, ECON500-3 Incomplete Complete infomation infomation Pefect infomation Impefect

More information

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information