A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network

Size: px
Start display at page:

Download "A Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network"

Transcription

1 A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University Av. Ariberto Pereira da Cunha 333. Pedregulho Guaratinguetá SP CEP: BRAZIL cassilda@feg.unesp.br Aníbal Tavares Azevedo Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University Av. Ariberto Pereira da Cunha 333. Pedregulho Guaratinguetá SP CEP: BRAZIL anibal@feg.unesp.br Abstract: - Assigning cells to switches in a cellular obile networ is nown as an NP-hard optiization proble. This eans that the alternative for the solution of this type of proble is the use of heuristic ethods, because they allow the discovery of a good solution in a very satisfactory coputational tie. This paper proposes a Bea Search ethod to solve the proble of assignent cell in cellular obile networs. Soe odifications in this algorith are also presented, which allows its parallel application. Coputational results obtained fro several tests confir the effectiveness of this approach and provide good solutions for large scale probles. Key-Words: - Cobinatorial Optiization. Assignent Proble. Bea Search Method. Cellular Networ. Quadratic Integer Prograing.. Introduction The prodigious growing of telecounications in recent ties aes it ore present in odern society. The popularization of one of the ost fantastic equipents of all ties, the obile phone is a ey factor for the copetition between the operators, leading to a search for a ore efficient cellular obile networ, and with capacity to attend the increasingly deand with ore and ore quality. In a cellular obile networ the services are offered in an area called cover zone. The area of coverage is often divided into sall geographic area called cells and each cell is responsible for the coverage (service availability) of a certain nuber of assignents. Therefore, we could say that the cells are basic units of the cellular obile networ. In each cell there is a base station controller, which is used to counicate with the sae cells subscribers. Furtherore, each cell is connected to special units called switches, which are located in obile switching center (MSC), which is responsible to ae the counication between any pair of cells possible. The cells have, due to coputational reasons, the hexagonal forat, which is siilar to a honeycob structure. Each obile switching center (MSC) has a capacity for a certain nuber of assignents. So, any cells can be connected to the sae MSC, respecting the capacity of each switch. However, one cell cannot be connected to ore than one MSC at the sae tie. Figure shows an exaple where the cells A and B are connected to the MSC and the cells C and D are connected to the MSC 2. MSC A B C D MSC 2 Fig.: Cellular obile networ cell division. The base station installed in each cell use radio channels to ae the assignents between the cells and to avoid interference; two adjacent cells use a group of different radio channels. When the counication user oves fro one cell to another, the base station of the new cell is due to aintain the counication of this user; therefore it has to allocate a new radio channel. The counication transfer fro a cell to another is called handoff. The ISSN: ISBN:

2 user transfer echanis between two base stations (cells) occurs when the signal level received by the user is too low. There are two types of handoff. In the exaple of figure, when the user oves fro cell A to B, the handoff is called soft handoff, because the two cells are connected to the sae obile switching center, and the induced cost for transferring fro A to B is wea. On the other hand, when the user oves fro cell A to cell C, the handoff is called coplex. The induced cost for this transfer is high, because the two switching center ( and 2) should be active during the handoff process, and the database containing inforation about the assignent should be updated. In this paper, a Bea Search algorith to solve the Proble of Assigning Cell to Switches in Cellular Mobile Networ is presented. Bea Search is a heuristic ethod for solving optiization probles. It is a branch and bound ethod adaptation, which only soe nodes are evaluated in the search tree. In sections 2 and 3 we present the proble and its atheatical forulation. In the section 4 we present the algorith developed. Sections 5 e 6 shows respectively the results obtained and the conclusions. 2. The Assigning Cell Proble One of the ain tass about planning cellular obile networ is the optial assignent of cells to switches, i.e., find an assignent of cells to switches that respect soe constraint and iniize the total cost of the operation. With a decrease of the total cost of the operation, two factors should be considered. The first one is the cost of cabling, i.e. the lin cost. This cost depends on the distance between the cell and its switching center. The second factor is the handoff cost aong cells. The proble of assignent n cells to switches in a cellular obile networ is a NP-hard proble [], which eans that there is no exact ethod able to solve this proble in polynoial tie. Only the exhaustive search would guarantee the optial solution for this proble. But, to ae this possible, it is necessary to exaine all possible solutions, which is really not viable, because the nuber of possible solutions is enorous. Due to this difficulty, the ethods used to solve this proble are the heuristics. In ost articles, there are any types of heuristics and the ones called eta-heuristics are the ost coon, sees for exaple: [][2]. Other authors developed Iplicit Enueration heuristics, see [3] [4]. 3. Matheatical Forulation Before presenting the forulation proble, we need to clarify that in this wor it was considered that the operator would offer the costs of cabling and handoff. A ore thorough description about the handoff calculation can be seen in Alonso [5]. The forulation of the proble as a proble of quadratic integer prograing, as given below: Being n the nuber of cells to be assigned to switches. It is assued that the cells and the switching centers localization are set and nown. Being H and H according costs per unit of tie for the soft handoff and for coplex handoffs that occur between the cells i e j ( i, j =, L, n). As it was given above, it is assued that the handoff costs are nown and proportional to the frequency of handoffs that occur between cells i and j. Being C i the cabling costs per unit of tie between the cell i and the switch ( i =, L, n ; =, L, ). Being λ i the nuber of calls per unit of tie destined to cell i, and M the capacity of a switch. This proble consists of assigning cells to switches in a way that iniize the cost function. The cost function integrates the handoff cost per tie and the cabling cost between cells and switches. The optiization of this proble ust not violate the axiu capacity of each switch and ust be taen into account that each cell could be assigned to a unique switch. The atheatical forulation of the described proble above was ade using integers variables, and non-linear constraints. Therefore, the following variables were defined., if the cell i is assigned to switch x i = 0, otherwise Considering that each cell can only be assigned to a unique center, there is the following constraint: = = for i =, L, n The switches capacity constraints are given by: n λ i M for =, L, i= The total cabling cost is given by:. n i= = C i x i () (2) The following additional variables were created to represent the costs of handoff: z = x x for i, j =, L, n e =, L,. (3) i j Observe in the constraint (3) above that z = when the cells i and j are connected in the sae switch and z = 0, otherwise. Considering = = all the switches, we have z = x j = if the ISSN: ISBN:

3 cells i and j are connected to the sae switch, and z = x j = 0 if they are connected to = = different switches. The total networ cost is given by the su of the cabling costs plus the handoff costs, and can be written as: n n n n n x j ) (4) i= = i= j= = i= j= = Ci + H x j + H ( According to Hedible [2], the soft handoff cost H can be considered irrelevant when copared to the coplex handoff cost H. So, we have h = H H, replacing in (4) and not taing the constant part into account, the objective function to be iniized is: n n n Ci + h ( x j ) i= = i= j= = Therefore the proble to be solved is the following: n n n n n Min Ci + h h x j i = = i = j = i = j = = = for i =, Ln = n s.a λ = (6) i M for, L, i = x = 0 or for i =,, n and =,, i L L It ust be observed that the proble of assigning cells to switches, as stated in (6), is non linear with integers variables. Many authors considered a transfored version of this proble by replacing the constraints (3) for a set of linear constraints which leads to a linear odel with integers variables, see: Menon [4], Merchand and Sengupta [3]. The algorith proposed here does not utilize this transforation. 4. The Bea Search Algorith The Bea Search is an iplicit enueration ethod for solving the cobinatorial optiization probles. It is said that it is an adaptation of the Branch and Bound ethod where only a predeterined nuber of best partial solutions (nodes) are evaluated in each level of the search tree, whilst the others are discarded peranently. As a big part of the tree search nodes is discarded, it eans that only a few nodes are ept for further branching and the others (5) are pruned off peranently, the ethod execution tie is polynoial in the size of the proble. Thus a Bea Search is a tree search technique that for each level of the tree a fixed nuber of nodes is analyzed and this result in a fixed nuber of solutions. We define the bea width as the nuber of nodes analyzed for each level, denoted by β. 4. The Tree with all the Possible Solutions Before presenting the proposed algorith, the search tree structure (assignent) is described for a sall exaple, and all possible solutions are listed properly. Being n = 4 the nuber of cells that should be assigned to = 2 switches. Each cell A i is able to receive a fixed nuber of calls λ i per unit of tie. Thus, the nuber of calls covered by cell A is λ and so on. The switch C routs these calls if cell A i is connected to the switch C. Each switch has a capacity M. Each cell can only be connected to one switch. Being x i =, if cell i is connected to switch and x i = 0, otherwise. The tables, 2, 3 and 4 showed below presents the inforation about the cabling cost, handoff cost, capacity of each cell and switch, for the exaple presented. Cell Switch Switch Cell/cel Table : Cabling cost C i between cells and switches Table 2: handoff cost h between cells. Cell Nuber of call Switch Capacity Table 3: Nuber of call λ i for each cell i. Table 4:switches capacity M. Before building the search tree is necessary to establish the following definitions: (D.) The tree is constructed by level and in each level i the assignent of the i-esie cell to each one of switches is ade. (D.2) The nodes that are in the level of the tree are called seed nodes because each one of the will generate a sub-tree of decisions. (D.3) In each level i, when aing the assignent fro i-esie cell to a switch, two costs are considered: the cabling cost and the handoff cost, taing into account the (i-) attribution entioned before. To be able to find an effective solution, an assignent of n cells ust be done. In the tree representation it corresponds to go through until the ISSN: ISBN:

4 level n (D.). Figure 2: Coplete Search Tree considering the seed node C in in level N (left sub-tree) and C2 in level N (right sub-tree). The Figure 2 shows the tree with all the possible solutions for this proble. The nuber of the switch is represented in the nodes, the cell nuber is represented by the letter A, so, A represents the cell, and the levels are represented by N, for exaple N represents the level, N2 the level 2 and so on. The nodes of each level of the tree represent an assignent. It begins with the tree fixing to a switch, for exaple, to the switch C and attributing to this a cell, for exaple, A. Then, the node, of level N, eans that cell A was assigned to switch C, i.e. x =. This first node is called the seed node. Once it is done, the assignent on the seed node follows aing the other attributions, always considering the assignent that was already ade in the first nodes. Note that the nuber of seed nodes is equal to the nuber switches (). Moreover each seed node will originate one sub-tree and the coplete tree will have then sub-trees. In figure 2, the nodes ared with a cross give an unfeasible assignent and they are eliinated fro the process. It is iportant give special attention to the total nuber of solutions which is n = 2 4 = 6, but only 6 aong the are feasible, justifying the application of a search tree procedure. For each tree level the allocation of a cell for all the switches is ade, thus in the level N the allocation of the cell A to each one of the switches (seed nodes) is ade. In the level N2 the allocation of the cell A 2 for each one of the switches is ade; in the level N3 the allocation of to the cell A3 is ade, and in the level N4 the allocation of the cell A4 is ade. Then, in the Figure 2, the level N2 has 4 nodes coing fro the allocation of the cell A2 to switches and 2, in the left sub-tree and to the switch 2 and in the second right sub-tree. In the level N3 we have 6 nodes that coe fro the attribution of the cell A3 respectively to the switch 2, and 2 to the left subtree and the switch, 2 and to the right sub-tree. Beside each node in figure 2, inside the sall rectangle, the cabling costs and the partial costs of handoff related to the allocation ade in the node also are presented, respectively. For exaple, in the level N3, we have the attribution of cell A3 to switch 2. In this case the cabling cost between A3 and C2 is 4 and the partial cost of handoff is 6 because there is a handoff between A3A, AA3, A3A2 and A2A3. In each level, only the partial costs of the solution that is being obtained are calculated because as it is said that the solution will only be coplete when the ultiate level of the tree nodes is generated. Thus, in the nodes of level N, there is only the cabling cost (linear cost). In the N2 level, the linear costs plus the handoff costs of the seed node until the nodes of the level N2 are already calculated, and therefore, in the ultiate level, there are linear costs plus the handoff costs of the seed nodes until the nodes of level N n. As we go down in the tree, the cost is being copleted by the decision taing. Therefore, the branches of the tree containing the nodes A C, A 2 C, A 3 C 2, and A 4 C 2 indicate that the following allocation was ade: x =, x 2 =, x 32 =, x 42 = The Tree Generated by Bea Search To avoid the exponential growth of the tree, the proposed algorith does not create all the nodes of the tree, as it has been shown in figure 2. The nodes are created according to soe rules. Theses rules also ai to prevent the creation of unfeasible solutions. In each node of the following inforation tree are stored: () Switch Identification; (2) Cell Identification; (3) Fixed cabling costs and partial handoff costs related to the allocation ade in the node;(4) Reaining switch capacity that it is representing. The reaining switch capacity M is coputed by decreasing the switch initial capacity M, the nuber of calls λ i referring to the cell deands that were already allocated to this switch. (5) Partial cost of the solution, i.e., cabling cost plus handoff of the seed node until the node were entioned. During the construction process of the solution tree, the first criterion whether to create or not a node in the level i, we ust chec the reaining capacity M of a switch. One node will only be created (assignent cell Ai) in the level i if λ i, M, i.e., if the call nuber λ i covered by the cell A i is less or equal to the reaining capacity ISSN: ISBN:

5 M of the switch C. If M < λ i, all the branches that will be originated fro this node are not going to exist, because the cell i cannot be attributed to the center. After going through the test of the switch capacity, the node will only reain in the solution tree if it passes in the search width criterion β. For exaple, if the search width chosen by the user is β =2, in each level, only the nodes that generate the two inors solutions, coputed by the technique of the greedy algorith, reain in the tree. Thus, for β =2, each node will only generate two branches, and they will be those that the greedy solution coputation produces the least cost. The algorith used for constructing the tree is the following: Begin level = 0 While (level < nuber of cells n) do: º Step: Do level = level + S... Create the nodes of this new level according to the switch capacity rule. S..2. For each node created in the level i, follows: Store the identification of the cell and the switch; Calculate and store the node cost, i.e., the fixed cabling costs and the partial handoff costs related to the attribution ade in the node. Calculate and store the solution partial cost, i.e., the cabling cost plus the handoff cost of the seed node until the created node; Calculate the reaining capacity M of all the switches ; If (level < nuber of switch) Then 2º Steps. For each node created in the º. Step (S.) and considering the calculated costs until then, find a greedy solution for the proble, through a Greedy Best-First Search (GBFS)[6] in the tree, starting fro this node. 3 o. Steps Keep in the tree, in this level, the nodes that generated the best β greedy solutions. Discard the rest of the nodes. End While Initially the algorith is in the level zero of solution, because the allocations will start to be ade now. Then do level= and start creating nodes (S.) in this level. The nodes of level are the seed nodes and are created one seed node for each switch. In (S.2), for each node created in (S.) is assigned a cell of the vector of cells considering the capacity of the switch. Follows it is calculated the cabling and handoff costs of each one of these nodes. The greedy best-first search perfored in the 2º Step, ais to choose, in the 3 o. Step, which nodes, of the level i, should reain in the tree of feasible solutions, to respect the width of search β. For exaple if β=2, in each level will reain only two nodes. The value of the inor greedy solution calculated in the 2 o. Step, is also used as upper bound (cutting) for generating or not the other nodes of the tree, in the º. Step. This upper bound should be updated when the inor greedy solutions are found. With this we have two cutting criterion for creating or not the nodes. The first of the is the switch capacity and the second is the cost of the inor greedy solution, i.e., if the partial cost of the solution in the node that has been just created is bigger than the best greedy solution cost this node should be excluded fro the solution. After finishing the greedy best-first search it should be verify if the level of the search tree is equal the nuber of cells. If it is the case, the algorith finishes, because the end of the tree is reached. If not, the algorith goes bac to the o. Step to generate the nodes of the next level. The Figures 3 (a)-(f), presented the detailed solution of the Exaple of the Section 3. by the Bea Search algorith. In the exaple is considered the width equal to β =2. The steps to be followed for solving the exaple are: Construct the nodes of level N (one node for each switch). The cabling and handoff costs, at this level are the sae as zero (see the costs in Table and 2). (ii) In level N2 initially are created 4 nodes, because fro the assignent ade in the level N, there are 4 possible attributions for the cell 2 as follows: A 2 C, A 2 C 2, in the sub-tree of the left and A 2 C 2, A 2 C in the sub-tree of the right. This situation is described in Figure 3(a) and corresponds to Bea Search º. Step. As the search width is two, only two of these nodes will reain in the tree. (iii) For choosing which nodes of level N2 will reain in the tree, a greedy best-first search is ade, until the last level, for each one of the 4 attribution ade in level N2. Suppose for exaple the node 2 of the level N2, on the left sub-tree, of Figure 3(b). The assignents ade until this node are: AC in level N and A2C2 in level N2 with cabling cost 4 and partial handoff 6. Now, should be ade the assignent of the cells A3 in level N3 and A4 in level N4. The cell A3 can be assigned to the switch C with cabling and handoff costs respectively of 4 e ISSN: ISBN:

6 2 (node of level N3), and assigned to the switch C2 with cabling costs and handoff, respectively of 4 and 4 (node 2 of level N3). As it regards of a greedy algorith, it is chosen to assign the cell A3 the switch C because the partial cost of this solution is less. It can be discard then the node 2 of level N3. Continuing the attributions fro the node of level N3, due to a capacity constraint, the cell A4 can only be attributed to the switch C2 and the cost of this attribution is zero for cabling and 2 for handoff. Applying this procedure for all the 4 nodes of level N2, will be found 4 greedy solutions, where will be choose the two with less cost. This situation corresponds to the 2º Step of Bea Search. The Figure 3c shows that the nodes choose to stay in the tree, level N2, (3 o Step) were: node 2, in the left sub-tree and node in the right sub-tree. Below are created the nodes of level N3 (º Step), and later a greedy search fro these nodes (Fig.3d), for choosing which nodes of level N3 will reain in the tree. The Fig.3e shows the nodes choose of level N3 (3 o. Step). In the end, it is obtained two solutions: A C, A 2 C 2, A 3 C, A 4 C 2 with cost of 28 and A C 2, A 2 C, A 3 C 2, A 4 C with cost of 36. It is then adopted the solution with less cost between the two. Fig. 3d Steps of Bea Search for the Exaple of section 3.. Fig. 3e - Steps of Bea Search for the Exaple of section 3.. Fig. 3f - Steps of Bea Search for the Exaple of section 3.. Fig. 3a Steps of Bea Search for the Exaple of section 3.. Fig. 3b Steps of Bea Search for the Exaple of section 3.. Fig. 3c Steps of Bea Search for the Exaple of section Changes in the Bea Search It is possible to iprove the perforance of Bea Search aing soe changes, such as establishing an order for aing the attribution of the cells to switches, according to a heuristic criterion. The exaple presented in section 4. followed for the nueric order of the cells. The descending order of the estiated cost of handoff and of cabling was chosen as a criterion to ae the attribution of the cells, i.e., for each cell A i was calculated the estiated cost of handoff and cabling CEHC given by Eq. (7). The Table 5 shows these calculations for the exaple of Section 4.. n CEHCi = h + ci j= = Antena A A A A CEHC Orde Table 5: Allocation order of cells (7) Another odification consists in applying the Bea Search algorith into each sub-tree separately. The advantage is that instead of solving a big proble, we solve saller sub probles and so it is possible to decrease the ris of eliinating a coplete sub-tree, when using the width search β, eliinating the region where the optial solution is found. To better illustrate, iagine a ore coplex proble, than the one presented in Section 4., with ISSN: ISBN:

7 4 switches. Reeber that each switch corresponds to a seed node, i.e, a coplete tree. If we tae the sae width search used in Section 4. exaple, β = 2, then only two seed nodes will reain in level N. Thus, two entire sub-trees will be cut without any Greedy Best-First Search Coputation. To avoid this proble we enforce the solution coputation for each sub-tree by iposing the Bea Search application for each seed node. This procedure has two advantages: avoid the eliination of an entire tree, without any node evaluation of this tree; (ii) could be ipleented in parallel and each for tree a Bea Search is coputed independently by one processor. In this way, if the proble has four switches, it would have 4 processors and each one of these processors would execute one Bea-Search in one sub-tree. This ipleentation perits to obtain a big reduction of coputational tie, because in each sub-tree we have a search proble totally independent, which disisses the counication between the processors providing a speed-up and an elevated efficiency. 5. Coputational Results We tested two versions of the bea search. The Bea Search considering the aendent of subsection 4.2 BSHCSP and the Bea Search (BS) considering the nuerical order for the allocation of cells as in the exaple of section instances were run with varied diensions. It has started with considered inor probles (45 cells and 2 switches), until probles considered big (250 cells and 4 switches). The instances are the sae of [3]. The algoriths were ipleented in Matlab 7.0, a achine with processor Intel 2.0 GHz, G of RAM. The Table 6 shows, for each one of the instances, the values of objective function obtained with the two versions of Bea Search: BS and BSHCSP. Instan Cells/ ce Switch BSHCSP BS Instan ce Cells/ Switch BSHCSP BS 45/ / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / / Table 6 Results obtained with the Bea Search ethods 6. Conclusion Heuristics type Bea Search does not require an initial solution and always find a feasible solution. One of the advantages of theses heuristics is that they do not generate all branches of the tree; their execution tie is polynoial. The result obtained with the two heuristics showed that they are relatively equivalents, with a sall gaining for those that used the order of allocation considering the handoff and cabling costs. The Bea Search subprobles (BSHCSP) can be easily ipleented in parallel. Therefore, it is needed to put a processor to wor on each sub-tree. Each processor will then search the best solution of each one of these subtrees. The efficiency of a parallel algorith depends on a balance distribution of the tass that are perfored on each processor and the volue of counications ade between the processors. In the BSHCSP the sub-trees have the sae size and are copletely independent, thus the tass to be executed by the processors are balanced and require no counication between the. Then is possible to obtain a reduction of coputational tie, which is of about 80% of the tie spent in the sequential algorith. References: [] AbuAara, M. H.; Sait, S. M.; Subhan, A., A, Heuristics Based Approach for Cellular Mobile Networ Planning, The International Wireless Counications and Mobile Coputing Conference (IWCMC06), July, 2006,Vancouver, Canada. [2] Hedible, C.; Pierre, S., Genetic algorith for the assignent of cells to switches in personal counication networs, Electrical and Coputer Engineering, Canadian Conf. on, vol. 2, 2000, pp [3] Merchant,A.; Sengupta, B., Assignent of cells to switches in PCS networs, IEEE/ACM Trans. Networing, vol. 3, Oct, 995, pp [4] Menon, S.; Gupta, R., Assigning cells to switches in cellular networs by incorporating a pricing echanis into siulated annealing, IEEE Transactions on Systes, Man, and Cybernetics, Part B, vol. 34, n., 2004, pp [5] Alonso, E., Meier-Hellstern, S., Pollini, G.P., Influence of Cell Geoetry on Handover and Registration Rates in Cellular and Universal Personal Telecounications Networs, 8 th ITC Specialist Seinar on universal Counication, Genova, Italy, 992. [6] Russell, S. Norvig, P. Artificial Intelligence: A Modern Approach., pp.94-95, Prentice Hall series in artificial intelligence. Prentice Hall, Upper Saddle River, 2nd edition, ISSN: ISBN:

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS

OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented

More information

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks

Utility-Based Resource Allocation for Mixed Traffic in Wireless Networks IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng

More information

Handling Indivisibilities. Notes for AGEC 622. Bruce McCarl Regents Professor of Agricultural Economics Texas A&M University

Handling Indivisibilities. Notes for AGEC 622. Bruce McCarl Regents Professor of Agricultural Economics Texas A&M University Notes for AGEC 6 Bruce McCarl Regents Professor of Agricultural Econoics Texas A&M University All or None -- Integer Prograing McCarl and Spreen Chapter 5 Many investent and probles involve cases where

More information

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses

Using Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization

More information

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER

A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER VIOLETA TOMAŠEVIĆ, SLOBODAN BOJANIĆ 2 and OCTAVIO NIETO-TALADRIZ 2 The Mihajlo Pupin Institute, Volgina 5, 000 Belgrade, SERBIA AND MONTENEGRO 2 Technical University

More information

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem

A Comparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Problem IE Vol. 7, No. 2, pp. 84-92, Septeber 2008. A Coparative Study of Two-phase Heuristic Approaches to General Job Shop Scheduling Proble Ji Ung Sun School of Industrial and Managent Engineering Hankuk University

More information

Multipath Selection and Channel Assignment in Wireless Mesh Networks

Multipath Selection and Channel Assignment in Wireless Mesh Networks Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011

EE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011 EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction

More information

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.

Structural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl. Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable

More information

Different criteria of dynamic routing

Different criteria of dynamic routing Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich

More information

The optimization design of microphone array layout for wideband noise sources

The optimization design of microphone array layout for wideband noise sources PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun

More information

Geo-activity Recommendations by using Improved Feature Combination

Geo-activity Recommendations by using Improved Feature Combination Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,

More information

Privacy-preserving String-Matching With PRAM Algorithms

Privacy-preserving String-Matching With PRAM Algorithms Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,

More information

Implementation of fast motion estimation algorithms and comparison with full search method in H.264

Implementation of fast motion estimation algorithms and comparison with full search method in H.264 IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 139 Ipleentation of fast otion estiation algoriths and coparison with full search ethod in H.264 A.Ahadi, M.M.Azadfar

More information

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3

TensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3 2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition

More information

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium

A Distributed Multi-service Resource Allocation Algorithm in Heterogeneous Wireless Access Medium 1 A Distributed Multi-service Resource Allocation Algorith in Heterogeneous Wireless Access Mediu Muhaad Isail, Student Meber, IEEE, and Weihua Zhuang, Fellow, IEEE Abstract In this paper, radio resource

More information

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem

Theoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The

More information

Minimax Sensor Location to Monitor a Piecewise Linear Curve

Minimax Sensor Location to Monitor a Piecewise Linear Curve NSF GRANT #040040 NSF PROGRAM NAME: Operations Research Miniax Sensor Location to Monitor a Piecewise Linear Curve To M. Cavalier The Pennsylvania State University University Par, PA 680 Whitney A. Conner

More information

Distributed Multicast Tree Construction in Wireless Sensor Networks

Distributed Multicast Tree Construction in Wireless Sensor Networks Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,

More information

Performance Analysis of RAID in Different Workload

Performance Analysis of RAID in Different Workload Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,

More information

Integrating fast mobility in the OLSR routing protocol

Integrating fast mobility in the OLSR routing protocol Integrating fast obility in the OLSR routing protocol Mounir BENZAID 1,2, Pascale MINET 1 and Khaldoun AL AGHA 1,2 1 INRIA, Doaine de Voluceau - B.P.105, 78153 Le Chesnay Cedex, FRANCE ounir.benzaid, pascale.inet@inria.fr

More information

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks

Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networks Energy Efficient Design Strategies of Translucent and Transparent IP Over WDM Networs F. Mousavi Madani Departent of coputer engineering Alzahra University Tehran, Iran, osavif@alzahra.ac.ir Received:

More information

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones

Fair Energy-Efficient Sensing Task Allocation in Participatory Sensing with Smartphones Advance Access publication on 24 February 2017 The British Coputer Society 2017. All rights reserved. For Perissions, please eail: journals.perissions@oup.co doi:10.1093/cojnl/bxx015 Fair Energy-Efficient

More information

THE rapid growth and continuous change of the real

THE rapid growth and continuous change of the real IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa

More information

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System

Designing High Performance Web-Based Computing Services to Promote Telemedicine Database Management System Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,

More information

Multi-Objective Territory Design with Capacity & Geographic Constraints

Multi-Objective Territory Design with Capacity & Geographic Constraints International Journal of Cobinatorial Optiization Probles and Inforatics, Vol. 1, No. 1, May-Aug 2010, pp. 3-12. ISSN: 2007-1558. Multi-Objective Territory Design with Capacity & Geographic Constraints

More information

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification

Solving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural

More information

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS

Evaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS Evaluation of the Tiing Properties of Two Control Networs: CAN and PROFIBUS Max Mauro Dias Santos 1, Marcelo Ricardo Steer 2 and Francisco Vasques 3 1 UnilesteMG, CEP 35170-056, Coronel Fabriciano MG Brasil.

More information

Image Filter Using with Gaussian Curvature and Total Variation Model

Image Filter Using with Gaussian Curvature and Total Variation Model IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.

More information

Finding Optimal Allocation of Constrained Cloud Capacity Using Hyperbolic Voronoi Diagrams on the Sphere

Finding Optimal Allocation of Constrained Cloud Capacity Using Hyperbolic Voronoi Diagrams on the Sphere Intelligent Inforation Manageent 4 9-5 http://dxdoiorg/46/ii455 Published Online October (http://wwwciporg/ournal/ii) Finding Optial Allocation of Constrained Cloud Capacity Using Hyperbolic Voronoi Diagras

More information

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems

Design Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se

More information

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands

Oblivious Routing for Fat-Tree Based System Area Networks with Uncertain Traffic Demands Oblivious Routing for Fat-Tree Based Syste Area Networks with Uncertain Traffic Deands Xin Yuan Wickus Nienaber Zhenhai Duan Departent of Coputer Science Florida State University Tallahassee, FL 3306 {xyuan,nienaber,duan}@cs.fsu.edu

More information

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks

Investigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,

More information

Minimax Sensor Location in the Plane

Minimax Sensor Location in the Plane NSF GRANT #040040 NSF PROGRAM NAME: Operations Research Miniax Sensor Location in the Plane To M. Cavalier The Pennsylvania State University University Par, PA 680 Enrique del Castillo The Pennsylvania

More information

IN many interactive multimedia streaming applications, such

IN many interactive multimedia streaming applications, such 840 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 8, NO. 5, MAY 06 A Geoetric Approach to Server Selection for Interactive Video Streaing Yaochen Hu, Student Meber, IEEE, DiNiu, Meber, IEEE, and Zongpeng Li, Senior

More information

Efficient and Strategyproof Spectrum Allocations in Multi-Channel Wireless Networks

Efficient and Strategyproof Spectrum Allocations in Multi-Channel Wireless Networks Efficient and Strategyproof Spectru Allocations in Multi-Channel Wireless Networks Ping Xu, Xiang-Yang Li, Senior Meber, IEEE, ShaoJie Tang, and JiZhong Zhao Abstract In this paper, we study the spectru

More information

Survivability Function A Measure of Disaster-Based Routing Performance

Survivability Function A Measure of Disaster-Based Routing Performance Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected

More information

A Novel Fast Constructive Algorithm for Neural Classifier

A Novel Fast Constructive Algorithm for Neural Classifier A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore

More information

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering

Clustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into

More information

Dynamical Topology Analysis of VANET Based on Complex Networks Theory

Dynamical Topology Analysis of VANET Based on Complex Networks Theory BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volue 14, Special Issue Sofia 014 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.478/cait-014-0053 Dynaical Topology Analysis

More information

Guillotine subdivisions approximate polygonal subdivisions: Part III { Faster polynomial-time approximation schemes for

Guillotine subdivisions approximate polygonal subdivisions: Part III { Faster polynomial-time approximation schemes for Guillotine subdivisions approxiate polygonal subdivisions: Part III { Faster polynoial-tie approxiation schees for geoetric network optiization Joseph S. B. Mitchell y April 19, 1997; Last revision: May

More information

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals

Secure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract

More information

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols

Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Control Message Reduction Techniques in Backward Learning Ad Hoc Routing Protocols Navodaya Garepalli Kartik Gopalan Ping Yang Coputer Science, Binghaton University (State University of New York) Contact:

More information

Gromov-Hausdorff Distance Between Metric Graphs

Gromov-Hausdorff Distance Between Metric Graphs Groov-Hausdorff Distance Between Metric Graphs Jiwon Choi St Mark s School January, 019 Abstract In this paper we study the Groov-Hausdorff distance between two etric graphs We copute the precise value

More information

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm

Detection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,

More information

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization

Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization 1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,

More information

Meta-heuristic Approaches for the Assembly Line Balancing Problem

Meta-heuristic Approaches for the Assembly Line Balancing Problem Proceedings of the 202 International Conference on Industrial Engineering and Operations Manageent Istanbul, Turey, July 3 6, 202 Meta-heuristic Approaches for the Assebly Line Balancing Proble Adil Bayasoğlu

More information

MAC schemes - Fixed-assignment schemes

MAC schemes - Fixed-assignment schemes MAC schees - Fixed-assignent schees M. Veeraraghavan, April 6, 04 Mediu Access Control (MAC) schees are echaniss for sharing a single link. MAC schees are essentially ultiplexing schees. For exaple, on

More information

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm

Shortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University

More information

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage

A Low-Cost Multi-Failure Resilient Replication Scheme for High Data Availability in Cloud Storage 216 IEEE 23rd International Conference on High Perforance Coputing A Low-Cost Multi-Failure Resilient Replication Schee for High Data Availability in Cloud Storage Jinwei Liu* and Haiying Shen *Departent

More information

Identifying Converging Pairs of Nodes on a Budget

Identifying Converging Pairs of Nodes on a Budget Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering

More information

Fair Resource Allocation for Heterogeneous Tasks

Fair Resource Allocation for Heterogeneous Tasks Fair Resource Allocation for Heterogeneous Tasks Koyel Mukherjee, Partha utta, Gurulingesh Raravi, Thangaraj Balasubraania, Koustuv asgupta, Atul Singh Xerox Research Center India, Bangalore, India 560105

More information

λ-harmonious Graph Colouring Lauren DeDieu

λ-harmonious Graph Colouring Lauren DeDieu λ-haronious Graph Colouring Lauren DeDieu June 12, 2012 ABSTRACT In 198, Hopcroft and Krishnaoorthy defined a new type of graph colouring called haronious colouring. Haronious colouring is a proper vertex

More information

Collaborative Web Caching Based on Proxy Affinities

Collaborative Web Caching Based on Proxy Affinities Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA

More information

Problem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm

Problem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm Proble Solving of graph correspondence using Genetics Algorith and ACO Algorith Alireza Rezaee, 1, Azizeh Ajalli 2 Assistant professor,departent of Mechatronics Engineering, Faculty of New Sciences and

More information

Analysing Real-Time Communications: Controller Area Network (CAN) *

Analysing Real-Time Communications: Controller Area Network (CAN) * Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination

More information

Knowledge Discovery Applied to Agriculture Economy Planning

Knowledge Discovery Applied to Agriculture Economy Planning Knowledge Discovery Applied to Agriculture Econoy Planning Bing-ru Yang and Shao-un Huang Inforation Engineering School University of Science and Technology, Beiing, China, 100083 Eail: bingru.yang@b.col.co.cn

More information

The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network

The Flaw Attack to the RTS/CTS Handshake Mechanism in Cluster-based Battlefield Self-organizing Network The Flaw Attack to the RTS/CTS Handshake Mechanis in Cluster-based Battlefield Self-organizing Network Zeao Zhao College of Counication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China National

More information

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing

A Trajectory Splitting Model for Efficient Spatio-Temporal Indexing A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada

More information

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS

QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755

More information

Geometric Constraint Solver using Multivariate Rational Spline Functions

Geometric Constraint Solver using Multivariate Rational Spline Functions Geoetric onstraint Solver using Multivariate ational Spline Functions Gershon Elber Departent of oputer Science Technion srael nstitute of Technology Haifa 3000 srael E-ail: gershon@cstechnionacil Myung-Soo

More information

A wireless sensor network for visual detection and classification of intrusions

A wireless sensor network for visual detection and classification of intrusions A wireless sensor network for visual detection and classification of intrusions ANDRZEJ SLUZEK 1,3, PALANIAPPAN ANNAMALAI 2, MD SAIFUL ISLAM 1 1 School of Coputer Engineering, 2 IntelliSys Centre Nanyang

More information

Relief shape inheritance and graphical editor for the landscape design

Relief shape inheritance and graphical editor for the landscape design Relief shape inheritance and graphical editor for the landscape design Egor A. Yusov Vadi E. Turlapov Nizhny Novgorod State University after N. I. Lobachevsky Nizhny Novgorod Russia yusov_egor@ail.ru vadi.turlapov@cs.vk.unn.ru

More information

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH

ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH ELEVATION SURFACE INTERPOLATION OF POINT DATA USING DIFFERENT TECHNIQUES A GIS APPROACH Kulapraote Prathuchai Geoinforatics Center, Asian Institute of Technology, 58 Moo9, Klong Luang, Pathuthani, Thailand.

More information

Automatic Graph Drawing Algorithms

Automatic Graph Drawing Algorithms Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs

More information

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router

Derivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of

More information

Optimal Route Queries with Arbitrary Order Constraints

Optimal Route Queries with Arbitrary Order Constraints IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL.?, NO.?,? 20?? 1 Optial Route Queries with Arbitrary Order Constraints Jing Li, Yin Yang, Nikos Maoulis Abstract Given a set of spatial points DS,

More information

OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS

OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS ADRIAN DEACONU Transilvania University of Brasov, Roania Abstract A linear tie

More information

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS

COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS International Journal of Coputer Science and Counication Vol. 3, No. 1, January-June 2012, pp. 181-185 COLLABORATIVE BEAMFORMING FOR WIRELESS AD-HOC NETWORKS A.H. Karode 1, S.R. Suralkar 2, Manoj Bagde

More information

Homework 1. An Introduction to Neural Networks

Homework 1. An Introduction to Neural Networks Hoework An Introduction to Neural Networks -785: Introduction to Deep Learning Spring 09 OUT: January 4, 09 DUE: February 6, 09, :59 PM Start Here Collaboration policy: You are expected to coply with the

More information

3D Building Detection and Reconstruction from Aerial Images Using Perceptual Organization and Fast Graph Search

3D Building Detection and Reconstruction from Aerial Images Using Perceptual Organization and Fast Graph Search 436 Journal of Electrical Engineering & Technology, Vol. 3, No. 3, pp. 436~443, 008 3D Building Detection and Reconstruction fro Aerial Iages Using Perceptual Organization and Fast Graph Search Dong-Min

More information

A Study of the Relationship Between Support Vector Machine and Gabriel Graph

A Study of the Relationship Between Support Vector Machine and Gabriel Graph A Study of the Relationship Between Support Vector Machine and Gabriel Graph Wan Zhang and Irwin King {wzhang, king}@cse.cuhk.edu.hk Departent of Coputer Science & Engineering The Chinese University of

More information

Minimum Delay Stream Routing and Content Caching in Hybrid Coalition Networks

Minimum Delay Stream Routing and Content Caching in Hybrid Coalition Networks Miniu Delay Strea Routing and Content Caching in Hybrid Coalition Networks Mostafa Dehghan, Anand Seethara, Ting He, Theodoros Salonidis Ji Kurose, Don Towsley, Bo Jiang, Raesh Sitaraan University of Massachussetts

More information

International Journal of Industrial Engineering Computations

International Journal of Industrial Engineering Computations International Journal of Industrial Engineering Coputations 10 (2019) 37 50 Contents lists available at GrowingScience International Journal of Industrial Engineering Coputations hoepage: www.growingscience.co/ijiec

More information

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design

A Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India

More information

Data & Knowledge Engineering

Data & Knowledge Engineering Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID

More information

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm

Research on a Kind of QoS-Sensitive Semantic Web Services Composition Method Based on Genetic Algorithm roceedings of the 7th International Conference on Innovation & Manageent 893 Research on a Kind of QoS-Sensitive Seantic Web Services Coposition Method Based on Genetic Algorith Cao Hongjiang, Nie Guihua,

More information

An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints

An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured from Different Viewpoints 519 An Integrated Processing Method for Multiple Large-scale Point-Clouds Captured fro Different Viewpoints Yousuke Kawauchi 1, Shin Usuki, Kenjiro T. Miura 3, Hiroshi Masuda 4 and Ichiro Tanaka 5 1 Shizuoka

More information

On the Complexity of Optimal Routing and Content Caching in Heterogeneous Networks

On the Complexity of Optimal Routing and Content Caching in Heterogeneous Networks On the Coplexity of Optial Routing and Content Caching in Heterogeneous Networks Mostafa Dehghan 1, Anand Seethara 2, Bo Jiang 1, Ting He 3, Theodoros Salonidis 3, Ji Kurose 1, Don Towsley 1, and Raesh

More information

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer

MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer MAPPING THE DATA FLOW MODEL OF COMPUTATION INTO AN ENHANCED VON NEUMANN PROCESSOR * Peter M. Maurer Departent of Coputer Science and Engineering University of South Florida Tapa, FL 33620 Abstract -- The

More information

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS

RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS RECONFIGURABLE AND MODULAR BASED SYNTHESIS OF CYCLIC DSP DATA FLOW GRAPHS AWNI ITRADAT Assistant Professor, Departent of Coputer Engineering, Faculty of Engineering, Hasheite University, P.O. Box 15459,

More information

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S

COMPUTER GENERATED HOLOGRAMS Optical Sciences 627 W.J. Dallas (Monday, August 23, 2004, 12:38 PM) PART III: CHAPTER ONE DIFFUSERS FOR CGH S COPUTER GEERATED HOLOGRAS Optical Sciences 67 W.J. Dallas (onday, August 3, 004, 1:38 P) PART III: CHAPTER OE DIFFUSERS FOR CGH S Part III: Chapter One Page 1 of 8 Introduction Hologras for display purposes

More information

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches

Efficient Estimation of Inclusion Coefficient using HyperLogLog Sketches Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT

More information

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points

Joint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University

More information

AN HEURISTIC ALTERNATIVE TO OPTIMIZE MAKESPAN OVER M PARALLEL MACHINES WITH RELEASE AND SECUENCE-DEPENDENT SETUP TIMES P m r j, s jk C max

AN HEURISTIC ALTERNATIVE TO OPTIMIZE MAKESPAN OVER M PARALLEL MACHINES WITH RELEASE AND SECUENCE-DEPENDENT SETUP TIMES P m r j, s jk C max AN HEURISTIC ALTERNATIVE TO OTIMIZE MAKESAN OVER M ARALLEL MACHINES WITH RELEASE AND SECUENCE-DEENDENT SETU TIMES r j, s j C ax LOEZ, ulián, ROZO, Viviana, SAAVEDRA, Iván and ATERNINA-ARBOLEDA, Carlos

More information

A Model Free Automatic Tuning Method for a Restricted Structured Controller. by using Simultaneous Perturbation Stochastic Approximation

A Model Free Automatic Tuning Method for a Restricted Structured Controller. by using Simultaneous Perturbation Stochastic Approximation 28 Aerican Control Conference Westin Seattle Hotel, Seattle, Washington, USA June -3, 28 WeC9.5 A Model Free Autoatic Tuning Method for a Restricted Structured Controller by Using Siultaneous Perturbation

More information

An AND/OR-graph Approach to the Container Loading Problem

An AND/OR-graph Approach to the Container Loading Problem Pergaon Int. Trans. Opl Res. Vol. I, No. 1, pp. 59-73, 1994 Elsevier Science Ltd. Copyright 0 1994 IFORS Printed in Great Britain. All rights reserved 0969-6016/94 $6.00 + 0.00 An AND/OR-graph Approach

More information

Generating Mechanisms for Evolving Software Mirror Graph

Generating Mechanisms for Evolving Software Mirror Graph Journal of Modern Physics, 2012, 3, 1050-1059 http://dx.doi.org/10.4236/jp.2012.39139 Published Online Septeber 2012 (http://www.scirp.org/journal/jp) Generating Mechaniss for Evolving Software Mirror

More information

The Internal Conflict of a Belief Function

The Internal Conflict of a Belief Function The Internal Conflict of a Belief Function Johan Schubert Abstract In this paper we define and derive an internal conflict of a belief function We decopose the belief function in question into a set of

More information

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks

Energy-Efficient Disk Replacement and File Placement Techniques for Mobile Systems with Hard Disks Energy-Efficient Disk Replaceent and File Placeent Techniques for Mobile Systes with Hard Disks Young-Jin Ki School of Coputer Science & Engineering Seoul National University Seoul 151-742, KOREA youngjk@davinci.snu.ac.kr

More information

A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS

A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS A GRAPH-PLANARIZATION ALGORITHM AND ITS APPLICATION TO RANDOM GRAPHS T. Ozawa and H. Takahashi Departent of Electrical Engineering Faculty of Engineering, Kyoto University Kyoto, Japan 606 Abstract. In

More information

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem.

Geometry. The Method of the Center of Mass (mass points): Solving problems using the Law of Lever (mass points). Menelaus theorem. Pappus theorem. Noveber 13, 2016 Geoetry. The Method of the enter of Mass (ass points): Solving probles using the Law of Lever (ass points). Menelaus theore. Pappus theore. M d Theore (Law of Lever). Masses (weights)

More information

An Efficient Approach for Content Delivery in Overlay Networks

An Efficient Approach for Content Delivery in Overlay Networks An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr

More information

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue

Enhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade

More information

Reconstruction of Time Series using Optimal Ordering of ICA Components

Reconstruction of Time Series using Optimal Ordering of ICA Components Reconstruction of Tie Series using Optial Ordering of ICA Coponents Ar Goneid and Abear Kael Departent of Coputer Science & Engineering, The Aerican University in Cairo, Cairo, Egypt e-ail: goneid@aucegypt.edu

More information

Efficient Learning of Generalized Linear and Single Index Models with Isotonic Regression

Efficient Learning of Generalized Linear and Single Index Models with Isotonic Regression Efficient Learning of Generalized Linear and Single Index Models with Isotonic Regression Sha M. Kakade Microsoft Research and Wharton, U Penn skakade@icrosoft.co Varun Kanade SEAS, Harvard University

More information

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM

AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM International Journal of Software Engineering & Applications (IJSEA), Vol.6, No.5, Septeber 205 AGV PATH PLANNING BASED ON SMOOTHING A* ALGORITHM Xie Yang and Cheng Wushan College of Mechanical Engineering,

More information

Global Optimization of Transmitter Placement in Wireless Communication Systems

Global Optimization of Transmitter Placement in Wireless Communication Systems Global Optiization of Transitter Placeent in Wireless Counication Systes J. He, A. Verstak, L. T. Watson, T. S. Rappaport, C. R. Anderson, N. Raakrishnan, C. A. Shaffer, W. H. Tranter, K. Bae, J. Jiang

More information

A Non-greedy Decision Tree Algorithm. Kristin P. Bennett. Rensselaer Polytechnic Institute. Troy, NY 12180

A Non-greedy Decision Tree Algorithm. Kristin P. Bennett. Rensselaer Polytechnic Institute. Troy, NY 12180 Global Tree Optiization: A Non-greedy Decision Tree Algith Kristin P. Bennett Eail benne@rpi.edu Departent of Matheatical Sciences Rensselaer Polytechnic Institute Troy, NY 28 Abstract A non-greedy approach

More information