Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Size: px
Start display at page:

Download "Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides"

Transcription

1 Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita School of Engineering Amrita University Amrita University Kerala, Inia Kerala, Inia Abstract Lanslies are one of the environmental isasters that cause massive estruction of human life an infrastructure. Real time monitoring of a lanslie prone areas are necessary to issue fore warning. To accomplish real time monitoring, massive amount of ata have to be collecte an analyze within a short span of time. This work has evelope a metho for effective ata collection an aggregation by implementing threshol alert levels. The sampling rates of threshol alert levels will etermine amount of ata collecte an aggregate which will reuce the power consumption by each wireless sensor noes. This work also helps to etermine the appropriate sampling rates for each threshol level, an the expecte number of ata packets in the queue. The time elay in receiving the ata packet at the analysis station can be etermine by using the value of expecte number of ata packets in the queue. 1 Introuction Environmental isasters are largely unpreictable an occur within very short spans of time. Fore warning of environmental isasters is more challenging than other applications ue to the fact that they occur within a very short span. Therefore technology has to be evelope to capture relevant signals in a very short span of time. Wireless sensors are one of the cutting ege technologies that can respon to rapi changes of ata. The fore warning of an environmental risk can be one if an only if the relevant ata within very short time spans are quickly capture with high time resolution, processe an transmitte to the analysis station. Wireless sensor network technology has all the above mentione capabilities. However, it has its own limitations such as relatively low amounts of battery power an low memory availability compare to many existing technologies. It oes, though, have the avantage of eploying sensors in hostile environments with a bare minimum of maintenance. This fulfills a very important nee for any real time monitoring. The scenario uner consieration for this work is lanslies. We aim to eploy wireless sensor networks in a lanslie prone area to etect lanslies 1. One of the main concerns for the successful implementation of a lanslie etection application is how to hanle the ata packets receive from each of the wireless sensor noes such that an accurate etection of the scenario or event is mae 1 This work has been partially fune by the WINSOC project, a Specific Targete Research Project (Contact Number ) co-fune by the INFSO DG of the European Commission within the RTD activities of the Thematic Priority Information Society Technologies.

2 possible. This paper provies information about a ata aggregation technique that can be use for a wireless sensor network eploye to etect rainfall inuce lanslies. The ata packets collecte from the eployment site have to be efficiently transmitte an aggregate for goo preiction results. This paper introuces one metho for ata aggregation which uses a threshol alert level to aggregate the ata packets. For the case of a wireless sensor network implemente using threshol alert levels, it fins the probability of ata packets being in the queue an also the expecte number of ata packets that will be in the queue at any ranom time. 2 Lanslie Detection Using Wireless Sensor Network Lanslie is a short live an suenly occurring phenomena that has catastrophic effects all aroun the worl. Inia faces lanslie every year with an annual loss of about US $400 million. Although there are ifferent types of lanslies, this work mainly concentrates on rainfall inuce lanslies which occur commonly in Inia. The wireless sensor noes will be eploye in a lanslie prone area. Each of the wireless sensor noes will be connecte to a sensor column (see Figure 1) containing various geophysical sensors. The ata from the geophysical sensors will be sample an collecte by the wireless sensor noes in the lowest layer of the wireless sensor network which has two layer hierarchy with low level noes an high level noes. The ata packets collecte by the low level noes will be sent to the higher layers for further processing. Each ata packet will consist of heterogeneous ata receive from ifferent geophysical sensors connecte to the low level noes. The information receive from basic ata analysis of the geo physical sensors in the sensor column inclues the time stamp, sequence number of the ata packet, sensor ata, sensor sensitivity an location. The network contains a two layer hierarchy consisting of a lowest layer which carries out the functions of ata collection an transmission to the Figure 1: Sensor Column higher layers. The upper layer will aggregate the ata an forwar it to the sink noe. Using a Wi-Fi connection the sink noe will then transmit the ata to a network server connecte to a VSAT network near the eployment site at Iukki, Kerala, South Inia. The satellite network will transmit the ata to a remote ata analysis center for further processing. The remote analysis station will be situate at at AMRITA University. 3 Data Aggregation In A Lanslie Scenario Real time applications require continuous monitoring, which in turn generates large amount of ata packets for analysis. The ata packets generate from the low level noes have to be efficiently aggregate an analyze by higher layer noes to etect or preict any emergence of a critical situation such as a lanslie. Threshol alert levels have been use for efficient ata aggregation with necessary ata.

3 3.1 Threshol Alert Levels Threshol base alert levels for the whole network have been evise for minimizing energy consumption an also for efficient ata hanling. In each of the threshol levels the ata packets collecte will be sample at ifferent rates. As the rate of ata packet collection an transmission changes the amount of energy rain will change accoringly. Three threshol alert levels have been evise for lanslie scenario. They are: Low alert level: During the low alert level, the external perceive risk is very low. Each sensor noe will transit between sleep an monitor states over a relatively longer time interval, T low. The rate of ata packet transmission from the cluster hea to the sink (the α% of total ata receive by the cluster hea from the low level noes) will be low (approximately 1 10%) in this alert level. Meium alert level: During the meium alert level, the external perceive risk is average. Each sensor noe will transit between sleep an monitor states over a meium time interval, T meium. The rate of ata packet transmission from the cluster hea to the sink (the α% of total ata receive by the cluster hea from the low level noes) will be meium (approximately 50 60%) in this alert level. High alert level: During the high alert level, the external perceive risk is very high. Each sensor noe will transit between sleep an monitor states over a shorter time interval, T high. The rate of ata packet transmission from the cluster hea to the sink (the α% of total ata receive by the cluster hea from the low level noes) will be high (approximately %) in this alert level. 3.2 Data Aggregation Metho As the network initiates each low level wireless noe will sample the geophysical sensors attache to the wireless sensor noe. The collecte ata will be converte as a ata packet consisting of a maximum of eight heterogeneous ata. The ata in the ata packet will be analyze using multivariate analysis. The result of the analysis will be compare with a preetermine threshol of the network alert level which is apriori known to the wireless noe (The preetermine threshol values will be foun using our laboratory experiments an fiel ata.). If the ata analysis result provies parameter value more than the preetermine threshol value, then the noe will change its state from monitor to active accoring to the state transition (as shown in Figure 2)evelope by Maneesha et.al[1]. Otherwise it will rop the packet an return to sleep state for a perio of time etermine by the alert level (such as T low, T meium, ort high ). The noe which has change its state to active will sen a long pulse to wake up all its group members in the same cluster. The cluster members on receiving the wake up call will change their state to active an their ata packet will be sent to the cluster hea. So continuous sampling of geophysical sensors may not be followe by transmission of the ata packets, if the parameter value oes not cross the preetermine threshol value. The cluster hea will wait to receive the ata packets from its cluster members. The cluster hea can process each packet arriving from the flow an aggregate them incrementally until they are all processe, as in [3]. However, this will consume more processing power. To avoi that situation an save power, we are employing bulk processing of ata. As the ata packets from the cluster members are receive, the cluster hea will perform ata aggregation algorithm base on multivariate analysis. The aggregate values along with an α% of ata ( where α% is some fixe constant percentage for each alert level) receive from the low level noes will be forware by the cluster heas to the sink. The sink will not perform complicate ata aggregation algorithms. However, the network alert level will etermine by the sink noe. The amount of ata receive at the sink will iffer since the constant value of α% of ata packet will iffer with respect to the alert levels an also with respect to the number of chil noes attache

4 Figure 2: Low Level Noe State Transition to each cluster hea. The sink noe will etermine the ratio of the ata packets which is efine as the number of ata packets recommening an alert change ivie by the number of ata packets total. If this ratio excees certain threshols, the alert level can change. The state of the network will thereby alter accoring to the ratio of the ata packets that have recommene an alert level change. The entire wireless network can therefore change its threshol alert level from one state to another. The alert level change of the whole network from high to low is a very rare change. As a result, the change from high to low alert level for the whole network will occur if an only if the maximum number of ata packets show such a result is necessary. The alert level change from meium to high has to be ecie very rapily ue to the fact that lanslies may occur in a short span. As a result, a minimum number of ata packets will etermine the transition from meium alert to high alert. The exact values of the ratio of ata packets that recommen for an alert change from one alert level to another will be etermine through simultion, laboratory experiments, an the collection of fiel ata. The alert level of the network will change if the ratio of ata packets recommening the change of alert level is greater than or equal to the pre etermine ratio etermine from continuous simulation an laboratory tests. Otherwise it will remain in the same alert level. The alert level change means all wireless sensor noes in the whole wireless network will change their alert level. Due to an alert level transition, low level noes have to change the sampling rate of the geophysical sensors an also the existing preetermine threshol value to the new alert level s preetermine threshol value. The frequency of ata transmitte in each alert level is ifferent. In the high alert level, the arrival rate at the cluster hea an sink noe will be a maximum while the arrival rate at the low alert level will be a minimum. That of the meium alert level will be an intermeiate value between the arrival rates of the high an low alert levels. This makes the whole arrival pattern non-homogeneous an also these ifferent rates of transmission of ata packets will contribute towars minimizing the whole network s energy consumption, which will in turn reuce the number of ata packets to be processe by the whole network for a ranom amount of time. The ata packets to be processe for a ranom amount of time will be etermine mainly by the threshol levels. Therefore the energy use by the whole network will be much less compare to that use by a network that is active through out the eployment. The ata aggregation for the whole network consists of a three level aggregation algorithm. The three levels has been iscusse earlier are at low level noes, cluster heas, an sink noe. The three level ata aggregation algorithm will reuce the amount of multivariate analysis to be performe for the whole network. Initially, in low level noes, the multivariate analysis will be performe an the

5 ata, along with the result will be save in a buffer. The multivariate analysis will not be performe for the next ata set. It only etermines the ifference with the previous ata. As a result, at each point in time, the buffer will have one ata packet (initial or fresh ata from just after a whole network alert level transition), the noe s result of multivariate analysis an the latest ata. Once the ifference reaches the threshol, the noe will wake up all its cluster members. All of the cluster members will then sen the ata packet to the cluster hea an multivariate analysis will be performe for the group of ata. Thus, it is not necessary to perform multivariate analysis for each an every ata arrival at low level noes. This will reuce the energy consume for ata processing which will in turn reuce the network level energy consumption.at the sink noe, multivariate analysis is not performe. It etermines the ratio of ata packets that recommen transition to a new alert level. This is a simple operation that consumes very little processing power. 4 Data Aggregation in a Subtree A subtree consiere for our stuy consists of chil noes connecte to a cluster hea, i.e., the subtree will have only single hop ata packet transmissions. The arrival pattern of ata packets to the cluster hea are ifferent with respect to each alert level. The amount of ata packets waiting for service will change accoring to the arrival rate transition. This will become a critical parameter for any real time application because if the queue size excees the buffer size then ata loss will occur. The arrival rate which causes ata loss is not an efficient one since the purpose of ata aggregation is not attaine an also energy is lost collecting an transmitting the ata. Energy consumption minimization an efficient ata aggregation can be performe if the monitoring application is aware of the optimal arrival rate, queue length, waiting time, etc. This will help to avoi ata packet an energy loss. Data arrival to the cluster hea can be moele as a non-homogeneous Poisson process with arrival rate λ(t), at time t. The network of chil noes connecte to a cluster hea can be treate as a M/M/1 queue with N-Policy. The service time neee by a cluster hea is exponential with rate of service µ. The cluster hea starts servicing whenever ata from all or a percentage of the chil noes (N g ) arrive at time t or whenever N g (> 1) units accumulate in the queue. Otherwise the cluster hea will be in a sleep state. (A cluster hea uses only three state transitions. It oes not use the monitor state). As soon as the service of one batch is over, the cluster hea will continue the ata aggregation if there exists N g waiting ata. Otherwise the cluster hea will change its status to sleep state an starts the processing of ata when N g ata accumulate in the queue. Any new arrival after N g waiting ata will be lost to the system with probability 1. Let X(t) enote the number of ata packets in the queue at time t. Let Y (t) enote the state of the cluster hea. Then X(t) has the state space {0, 1, 2,..., N g 1, N g } an Y (t) can be efine as Y (t) = { Then the process 1, if theclusterheaisbusy 0, if theclusterheaisileorsleep Z(t) = {(X(t), Y (t)) ; t 0} (1) is a non-homogeneous birth/eath process over the state space E = {0, 1, 2,..., N g 1} {0, 1} (N g, 1). To stuy the process Z(t), efine P ij (t) = P r {(X(t), Y (t)) = (i, j)}, (i, j) E (2) The Forwar Kolmogorov Differential Difference Equations associate with Z(t) are the following: t P 00 (t) = λ(t)p 00 (t) + µp 01 (t) (3) t P i0 (t) = λ(t)p i0 (t)+λ(t)p i 10 (t)+µp i1 (t) (4) where i = 1, 2,..., N g t P01 (t) = (λ(t) + µ) P01(t)+λ(t)PNg 10(t)+µPNg1(t) (5)

6 t P i1 (t) = (λ(t) + µ) P i1 (t) + λ(t)p i 11 (t) (6) where i = 1, 2,..., N g 1 t P N g1 (t) = µp Ng1(t) + λ(t)p Ng 11(t) (7) In matrix notation, Equations 3 to 7 can be written as P (t) = T P (t) (8) with P (0) = P 0 where P (t) = [ The P 00 (t),, P Ng 10 (t), P 01 (t),, P Ng1 (t) ] expecte number of ata packets in the queue when the server is busy is given by: is a matrix of orer (2N g + 1) 1 with its erivative [ P (t) = t P 00 (t), t P 10 (t),..., ] t P N g1 (t) an P 0 is a vector with initial conition P 0 = (1, 0, 0,..., 0), which means initially there are none in the system. T is a (2N g + 1) (2N g + 1) rate matrix. The rate matrix T (5 x 5)is given by λ (t) λ (t) λ (t) λ (t) 0 0 T = µ 0 µ λ (t) λ (t) 0 0 µ 0 µ λ (t) λ (t) 0 0 µ 0 µ (9) has the unique solution. P (t) = T P (t) P (t) = P 0 e tt (10) The solution to the equation 11 will provie the probability at a time t. Using the probability, the expecte number of ata packets in the queue can be foun as follows: Expecte number of ata packets in queue when the cluster hea is in the sleep state is given by: E [x/y (t) = 0] = E [x/y (t) = 1] = N g 1 i=1 N g 1 i=1 ip i0 (12) ip i0 (13) Thus, the expecte number of ata packets in the queue at any ranom time is given by: E [x] = 1 E [x/y (t) = j] P (Y (t) = j) j=0 E [x] = E [x/y (t) = 0] P.0 + E [x/y (t) = 1] P.1 (14) where P.0 is the probability of the cluster hea being in the sleep state,p.1 is the probability of the cluster hea being in the busy state.from the above results, we will be able to fin the ifferent arrival rates, the waiting time istribution, etc. 5 Data Aggregation from the Cluster heas to a Sink Noe which can be compute as P (t) = Ce tt C 1 P 0 (11) where A = C 1 T C is the Joran Canonical form of T. To fin C 1 T C, the characteristics of T can be compute by iagonalizing the T matrix. Thus we get the characteristic roots as λ 1, λ 2,..., λ 2Ng an 0. Using these roots, compute the invertible matrix C such that C 1 T C is the Joran Canonical form of T. Let the sink noe be connecte to N c cluster heas. The ata packets from the cluster heas have to be collecte, analyze an forware to the satellite network by the sink noe. Each cluster hea, after completing its multivariate analysis for a group of ata at time t, will transmit an α% of ata packets receive from the low level noes an the result of the analysis to the sink noe. The number of ata packets sent from each cluster hea iffers with respect to the alert level an also with respect to the number of chil noes attache to the

7 cluster hea. Therefore, the number of ata packets arriving at the sink noe from each cluster hea will iffer. The sink will maintain one queue for each of the cluster heas since it has to hanle more than one ata packet from each of the queues at a time t. As a result, if you have N c cluster heas, the sink will maintain the same number of queues. The sink has to receive an analyze the ata in bulk, as a α% = n of the number of ata packets, from each queue an then etermine the ratio of ata packets recommen for state transition. If the ratio of ata packets recommene for the transition is greater than the ratio shown in Table??, then the whole network will change the alert level, otherwise the alert level remains the same. 6 Conclusion an Future Work This paper iscusses ata aggregation in a wireless sensor network, in particular the network use for the lanslie scenario. It iscusses the ifferent steps neee for ata aggregation, the expecte number of ata packets in the queue, an their arrival rates. The avantage of this algorithm is that it reuces the amount of energy consume by the whole network as well as helps in fining the arrival rate of ata packets. This work will be teste in our laboratory set up, through wireless network simulators, an through the stuy of fiel ata. In the future, this work will be extene to preict the arrival rates to be aopte for a lanslie scenario at the cluster hea level an at the sink noe level. This work can be extene to etermine bouns on the number of intermeiate noes if the number of low level noes is known. It can also be extene to stuy the elay incurre for ata analysis with respect to each arrival rate, with respect to changes in the ensity of the network, an with respect to other factors that have a irect effect on preicting any real time scenario. Venkat.,Factors an Approaches for Energy Optimize Wireless Sensor Network to Detect Rainfall Inuce Lanslies, International Conference on Wireless Networks, WORLDCOM-07, Las Vegas, USA, Jun [2] Terzis. Anreas., Ananarajah. Annalingam., Moore. Kevin., Wang. I-Jeng.,Slip Surface Localization in Wireless Sensor Networks for Lanslie Preiction, IPSN 06, USA, April 19-21, [3] Akkaya. Kemal., Younis. Mohame., Youssef. Moustafa.,Efficient Aggregation of Delay-Constraine Data in Wireless Sensor Networks, Department of Computer Science an Electrical Engineering, University of Marylan. [4] Zhang. Honghai., Hou. C. Jennifer.,On the Upper Boun of α-lifetime for Large Sensor Networks,ACM Transactions on Sensor Networks, Vol. 1, No. 2, Pages , November [5] Linsey. Stephanie., Raghavenra. Cauligi.,Sivalingam. Krishna.,Data Gathering in Sensor Networks using the Energy Delay Metric,Proceeings of the 15th International Parallel an Distribute Processing Symposium, IEEE, 2001 [6] Mehi, J., Stochastic Moels in Queuing Theory, Acaemic Press, An Imprint of Elsevier., 2n eition, References [1] Ramesh. Maneesha., Raj. Rehna., Freeman. Joshua., Kumar. Sangeeth., Rangan.

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach

An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach An Energy Efficient Routing for Wireless Sensor Networks: Hierarchical Approach Nishi Sharma, Vanna Verma Abstract Wireless sensor networks (WSNs) is one of the emerging fiel of research in recent era

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 0 0 0 0 0 0 0 0 on-uniform Sensor Deployment in Mobile Wireless Sensor etworks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA

All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA Preprint, August 5, 2018. 1 All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA Mikhail Ivanov, Frerik Brännström, Alexanre Graell i Amat, an Petar Popovski Department of Signals an Systems,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Performance Modelling of Necklace Hypercubes

Performance Modelling of Necklace Hypercubes erformance Moelling of ecklace ypercubes. Meraji,,. arbazi-aza,, A. atooghy, IM chool of Computer cience & harif University of Technology, Tehran, Iran {meraji, patooghy}@ce.sharif.eu, aza@ipm.ir a Abstract

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

A Metric for Routing in Delay-Sensitive Wireless Sensor Networks

A Metric for Routing in Delay-Sensitive Wireless Sensor Networks A Metric for Routing in Delay-Sensitive Wireless Sensor Networks Zhen Jiang Jie Wu Risa Ito Dept. of Computer Sci. Dept. of Computer & Info. Sciences Dept. of Computer Sci. West Chester University Temple

More information

Short-term prediction of photovoltaic power based on GWPA - BP neural network model

Short-term prediction of photovoltaic power based on GWPA - BP neural network model Short-term preiction of photovoltaic power base on GWPA - BP neural networ moel Jian Di an Shanshan Meng School of orth China Electric Power University, Baoing. China Abstract In recent years, ue to China's

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks Coorinating Distribute Algorithms for Feature Extraction Offloaing in Multi-Camera Visual Sensor Networks Emil Eriksson, György Dán, Viktoria Foor School of Electrical Engineering, KTH Royal Institute

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Chalmers Publication Library

Chalmers Publication Library Chalmers Publication Library All-to-all Broacast for Vehicular Networks Base on Coe Slotte ALOHA This ocument has been ownloae from Chalmers Publication Library (CPL). It is the author s version of a work

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm NASA/CR-1998-208733 ICASE Report No. 98-45 Parallel Directionally Split Solver Base on Reformulation of Pipeline Thomas Algorithm A. Povitsky ICASE, Hampton, Virginia Institute for Computer Applications

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stolyar Abstract Backpressure-base aaptive routing

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

Investigation into a new incremental forming process using an adjustable punch set for the manufacture of a doubly curved sheet metal

Investigation into a new incremental forming process using an adjustable punch set for the manufacture of a doubly curved sheet metal 991 Investigation into a new incremental forming process using an ajustable punch set for the manufacture of a oubly curve sheet metal S J Yoon an D Y Yang* Department of Mechanical Engineering, Korea

More information

Inverse Model to Determine the Optimal Number of Drops of RDC Column Using Fuzzy Approach

Inverse Model to Determine the Optimal Number of Drops of RDC Column Using Fuzzy Approach Inverse Moel to Determine the Optimal Number of Drops of RDC Column Using Fuzzy Approach 1 HAFEZ IBRAHIM, 2 JAMALLUDIN TALIB, 3 NORMAH MAAN Department of Mathematics Universiti Teknologi Malaysia 81310

More information

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science

More information

Tight Wavelet Frame Decomposition and Its Application in Image Processing

Tight Wavelet Frame Decomposition and Its Application in Image Processing ITB J. Sci. Vol. 40 A, No., 008, 151-165 151 Tight Wavelet Frame Decomposition an Its Application in Image Processing Mahmu Yunus 1, & Henra Gunawan 1 1 Analysis an Geometry Group, FMIPA ITB, Banung Department

More information

Handling missing values in kernel methods with application to microbiology data

Handling missing values in kernel methods with application to microbiology data an Machine Learning. Bruges (Belgium), 24-26 April 2013, i6oc.com publ., ISBN 978-2-87419-081-0. Available from http://www.i6oc.com/en/livre/?gcoi=28001100131010. Hanling missing values in kernel methos

More information

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time

More information

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks

Backpressure-based Packet-by-Packet Adaptive Routing in Communication Networks 1 Backpressure-base Packet-by-Packet Aaptive Routing in Communication Networks Eleftheria Athanasopoulou, Loc Bui, Tianxiong Ji, R. Srikant, an Alexaner Stoylar arxiv:15.4984v1 [cs.ni] 27 May 21 Abstract

More information

A Hybrid Routing Algorithm for Delay Tolerant Networks

A Hybrid Routing Algorithm for Delay Tolerant Networks Sensors & Transucers 2013 by IFSA http://www.sensorsportal.com A Hybri Routing Algorithm for Delay Tolerant Networs Jianbo LI, Jixing XU, Lei YOU, Chenqu DAI, Jieheng WU Information Engineering College

More information

Spare Capacity Planning Using Survivable Alternate Routing for Long-Haul WDM Networks

Spare Capacity Planning Using Survivable Alternate Routing for Long-Haul WDM Networks Spare Capacity Planning Using Survivable lternate Routing for Long-Haul WDM Networks in Zhou an Hussein T. Mouftah Department of lectrical an Computer ngineering Queen s University, Kingston, Ontario,

More information

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks Optimal Routing an Scheuling for Deterministic Delay Tolerant Networks Davi Hay Dipartimento i Elettronica olitecnico i Torino, Italy Email: hay@tlc.polito.it aolo Giaccone Dipartimento i Elettronica olitecnico

More information

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative

More information

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance

Impact of FTP Application file size and TCP Variants on MANET Protocols Performance International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir

More information

d 3 d 4 d d d d d d d d d d d 1 d d d d d d

d 3 d 4 d d d d d d d d d d d 1 d d d d d d Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

Rough Set Approach for Classification of Breast Cancer Mammogram Images

Rough Set Approach for Classification of Breast Cancer Mammogram Images Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems

More information

A Cost Model For Nearest Neighbor Search. High-Dimensional Data Space

A Cost Model For Nearest Neighbor Search. High-Dimensional Data Space A Cost Moel For Nearest Neighbor Search in High-Dimensional Data Space Stefan Berchtol University of Munich Germany berchtol@informatikuni-muenchene Daniel A Keim University of Munich Germany keim@informatikuni-muenchene

More information

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model

TCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model TCP Symbiosis: Congestion Control Mechanisms of TCP base on Lotka-Volterra Competition Moel Go Hasegawa Cybermeia Center Osaka University 1-3, Machikaneyama-cho, Toyonaka, Osaka 56-43, JAPAN Email: hasegawa@cmc.osaka-u.ac.jp

More information

A Multi-class SVM Classifier Utilizing Binary Decision Tree

A Multi-class SVM Classifier Utilizing Binary Decision Tree Informatica 33 (009) 33-41 33 A Multi-class Classifier Utilizing Binary Decision Tree Gjorgji Mazarov, Dejan Gjorgjevikj an Ivan Chorbev Department of Computer Science an Engineering Faculty of Electrical

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter

Scalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter FDL sel. VOA SOA 100 Regular papers ONDM 2018 Scalable Deterministic Scheuling for WDM Slot Switching Xhaul with Zero-Jitter Bogan Uscumlic 1, Dominique Chiaroni 1, Brice Leclerc 1, Thierry Zami 2, Annie

More information

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links

Overview : Computer Networking. IEEE MAC Protocol: CSMA/CA Internet mobility TCP over noisy links Overview 15-441 15-441: Computer Networking 15-641 Lecture 24: Wireless Eric Anerson Fall 2014 www.cs.cmu.eu/~prs/15-441-f14 Internet mobility TCP over noisy links Link layer challenges an WiFi Cellular

More information

Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks

Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks Xinxin Liu, Han Zhao, Xin Yang Computer & Information Science & Eng. University of Floria Email:{xinxin,han,xin}@cise.ufl.eu

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

Adjusted Probabilistic Packet Marking for IP Traceback

Adjusted Probabilistic Packet Marking for IP Traceback Ajuste Probabilistic Packet Marking for IP Traceback Tao Peng, Christopher Leckie, an Kotagiri Ramamohanarao 2 ARC Special Research Center for Ultra-Broaban Information Networks Department of Electrical

More information

Evolutionary Optimisation Methods for Template Based Image Registration

Evolutionary Optimisation Methods for Template Based Image Registration Evolutionary Optimisation Methos for Template Base Image Registration Lukasz A Machowski, Tshilizi Marwala School of Electrical an Information Engineering University of Witwatersran, Johannesburg, South

More information

Congestion Control using Cross layer and Stochastic Approach in Distributed Networks

Congestion Control using Cross layer and Stochastic Approach in Distributed Networks Congestion Control using Cross layer an Stochastic Approach in Distribute Networks Selvarani R Department of Computer science an Engineering Alliance College of Engineering an Design Bangalore, Inia Vinoha

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

Depth Sizing of Surface Breaking Flaw on Its Open Side by Short Path of Diffraction Technique

Depth Sizing of Surface Breaking Flaw on Its Open Side by Short Path of Diffraction Technique 17th Worl Conference on Nonestructive Testing, 5-8 Oct 008, Shanghai, China Depth Sizing of Surface Breaking Flaw on Its Open Sie by Short Path of Diffraction Technique Hiroyuki FUKUTOMI, Shan LIN an Takashi

More information

6 Gradient Descent. 6.1 Functions

6 Gradient Descent. 6.1 Functions 6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output

More information

Modifying ROC Curves to Incorporate Predicted Probabilities

Modifying ROC Curves to Incorporate Predicted Probabilities Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy

More information

Reformulation and Solution Algorithms for Absolute and Percentile Robust Shortest Path Problems

Reformulation and Solution Algorithms for Absolute and Percentile Robust Shortest Path Problems > REPLACE THIS LINE WITH YOUR PAPER IENTIFICATION NUMBER (OUBLE-CLICK HERE TO EIT) < 1 Reformulation an Solution Algorithms for Absolute an Percentile Robust Shortest Path Problems Xuesong Zhou, Member,

More information

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember 107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

A Model for the Expected Running Time of Collision Detection using AABB Trees

A Model for the Expected Running Time of Collision Detection using AABB Trees Eurographics Symposium on Virtual Environments (26) Roger Hubbol an Ming Lin (Eitors) A Moel for the Expecte Running Time of Collision Detection using AABB Trees Rene Weller2 an Jan Klein an Gabriel Zachmann2

More information

Classical Mechanics Examples (Lagrange Multipliers)

Classical Mechanics Examples (Lagrange Multipliers) Classical Mechanics Examples (Lagrange Multipliers) Dipan Kumar Ghosh Physics Department, Inian Institute of Technology Bombay Powai, Mumbai 400076 September 3, 015 1 Introuction We have seen that the

More information

Open Access Adaptive Image Enhancement Algorithm with Complex Background

Open Access Adaptive Image Enhancement Algorithm with Complex Background Sen Orers for Reprints to reprints@benthamscience.ae 594 The Open Cybernetics & Systemics Journal, 205, 9, 594-600 Open Access Aaptive Image Enhancement Algorithm with Complex Bacgroun Zhang Pai * epartment

More information

Dense Disparity Estimation in Ego-motion Reduced Search Space

Dense Disparity Estimation in Ego-motion Reduced Search Space Dense Disparity Estimation in Ego-motion Reuce Search Space Luka Fućek, Ivan Marković, Igor Cvišić, Ivan Petrović University of Zagreb, Faculty of Electrical Engineering an Computing, Croatia (e-mail:

More information

New Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction

New Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction New Geometric Interpretation an Analytic Solution for uarilateral Reconstruction Joo-Haeng Lee Convergence Technology Research Lab ETRI Daejeon, 305 777, KOREA Abstract A new geometric framework, calle

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

An Improved Output-size Sensitive Parallel Algorithm for Hidden-Surface Removal for Terrains

An Improved Output-size Sensitive Parallel Algorithm for Hidden-Surface Removal for Terrains An Improve Output-size Sensitive arallel Algorithm for Hien-Surface Removal for Terrains Neelima Gupta an Saneep Sen Department of Computer Science an Engineering Inian Institute of Technology New Delhi

More information

William S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract

William S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract Optimization Methos for Calculating Design Imprecision y William S. Law Eri K. Antonsson Engineering Design Research Laboratory Division of Engineering an Applie Science California Institute of Technology

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

5th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2015)

5th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2015) 5th International Conference on Avance Design an Manufacturing Engineering (ICADME 25) Research on motion characteristics an application of multi egree of freeom mechanism base on R-W metho Xiao-guang

More information

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications Top-own Connectivity Policy Framework for Mobile Peer-to-Peer Applications Otso Kassinen Mika Ylianttila Junzhao Sun Jussi Ala-Kurikka MeiaTeam Department of Electrical an Information Engineering University

More information

Evaluation of Emergency Response Capability for Large-Scale Construction Project Engineering Disaster Based on Metadata

Evaluation of Emergency Response Capability for Large-Scale Construction Project Engineering Disaster Based on Metadata Evaluation of Emergency Response Capability for Large-Scale Construction Proect Engineering Disaster Base on Metaata Shengeng Xu Department of Management, Tianin University, Tianin 372,China E-mail: 6462261@qq.com

More information

Design and Analysis of Optimization Algorithms Using Computational

Design and Analysis of Optimization Algorithms Using Computational Appl. Num. Anal. Comp. Math., No. 3, 43 433 (4) / DOI./anac.47 Design an Analysis of Optimization Algorithms Using Computational Statistics T. Bartz Beielstein, K.E. Parsopoulos,3, an M.N. Vrahatis,3 Department

More information

Interior Permanent Magnet Synchronous Motor (IPMSM) Adaptive Genetic Parameter Estimation

Interior Permanent Magnet Synchronous Motor (IPMSM) Adaptive Genetic Parameter Estimation Interior Permanent Magnet Synchronous Motor (IPMSM) Aaptive Genetic Parameter Estimation Java Rezaie, Mehi Gholami, Reza Firouzi, Tohi Alizaeh, Karim Salashoor Abstract - Interior permanent magnet synchronous

More information

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -

More information