Quorum Based Data Replication in Grid Environment

Size: px
Start display at page:

Download "Quorum Based Data Replication in Grid Environment"

Transcription

1 Quorum Based Data Replicatio i Grid Eviromet Rohaya Latip, Hamidah Ibrahim, Mohamed Othma, Md Nasir Sulaima, ad Azizol Abdullah Faculty of Computer Sciece ad Iformatio Techology, Uiversiti Putra Malaysia {rohaya,hamidah,mothma,asir,azizol}@fsktm.upm.edu.my Abstract. Replicatio is a useful techique for distributed database systems ad ca be implemeted i a grid computatio eviromet to provide a high availability, fault tolerat, ad ehace the performace of the system. This paper discusses a ew protocol amed Diagoal Data Replicatio i 2D Mesh structure (DR2M) protocol where the performace addressed are data availability which is compared with the previous replicatio protocols, Read- Oe Write-All (ROWA), Votig (VT), Tree Quorum (TQ), Grid Cofiguratio (GC), ad Neighbor Replicatio o Grid (NRG). DR2M protocol is orgaized i a logical 2D mesh structure ad by usig quorums ad votig techiques to improve the performace ad availability of the replicatio protocol where it reduce the umber of copies of data replicatio for read or write operatios. The data file is copied at the selected ode of the diagoal site i a quorum. The selectio of a replica depeds o the diagoal locatio of the structured 2D mesh etwork where the middle ode is selected because it is the best locatio to get a copy of the data if every ode has the equal umber of request ad data accessig i the etwork. The algorithm i this paper also calculates the best umber of odes i each quorum ad how may quorums are eeded for N umber of odes i a etwork. DR2M protocol also esures that the data for read ad write operatios is cosistecy, by proofig the quorum must ot have a oempty itersectio quorum. To evaluate DR2M protocol, we developed a simulatio model i Java. Our results prove that DR2M protocol improves the performace of the data availability compare to the previous data replicatio protocol, ROWA, VT, TQ, GC ad NRG. Keywords: Data replicatio, Grid, Data maagemet, Availability, Replica cotrol protocol. 1 Itroductio A grid is a distributed etwork computig system, a virtual computer formed by a etworked set of heterogeeous machies that agree to share their local resources with each other. A grid is a very large scale, geeralized distributed etwork computig system that ca scale to iteret size eviromet with machies distributed across multiple orgaizatios ad admiistrative domais [1, 2]. Esurig efficiet access to such a huge etwork ad widely distributed data is a challege to G. Wag et al. (Eds.): RSKT 2008, LNAI 5009, pp , Spriger-Verlag Berli Heidelberg 2008

2 380 R. Latip et al. those who desig, maitai, ad maage the grid etwork. The availability of a data o a large etwork is a issue [3, 4, 5, 6] because geographically it is distributed ad has differet database maagemet to share across the grid etwork whereas replicatig data ca become expesive if the umber of operatios such as read or write operatios is high. I our work, we ivestigate the use of replicatio o a grid etwork to improve its ability to access data efficietly. Distributed computig maages thousads of computer systems ad this has limited its memory ad processig power. O the other had, grid computig has some extra characteristics. It is cocered to efficiet utilizatio of a pool of heterogeeous systems with optimal workload maagemet utilizig a eterprise's etire computatioal resources (servers, etworks, storage, ad iformatio) actig together to create oe or more large pools of computig resources. There is o limitatio of users or origiatios i grid computig. Eve though grid sometime ca be as miimum oe ode but for our protocol the best umber of odes should be more tha five odes to implemet the protocol. This protocol is suitable for large etwork such as grid eviromet. There are some research bee doe for replica cotrol protocol i distributed database ad grid such as Read-Oe Write-All (ROWA) [7], Votig (VT) [8], Tree Quorum (TQ) [9, 10], Grid Cofiguratio (GC) [11, 12], ad the latest research i year 2007 is Neighbor Replicatio o Grid (NRG) [13, 14, 15]. Each protocol has its ow way of optimizig the data availability. The usage of replica is to get a optimize data accessig i a large ad complex grid. Fig. 1 illustrates the usage of replica protocol i grid where it is located i the replica optimizatio compoet [16]. Resource Broker Iformatio Service User Iterface Replica Maager Cliet Replica Locatio Service Replica Optimizatio Storage Elemet Moitor Storage Elemet Network Moitor Fig. 1. Grid Compoets Iteract with Replica Maager i Grid I this paper, we preset a ew quorum-based protocol for data replicatio that provides both high data availability ad low respose time [17]. The proposed protocol imposes a logical two dimesioal mesh structure to produce the best umber of quorums ad obtai good performace of data availability. Quorums improved the performace of fault tolerat ad availability of replicatio protocols [18]. Quorums reduce the umber of copies ivolved i readig or writig

3 Quorum Based Data Replicatio i Grid Eviromet 381 data. To address the availability, we replicate data o the selected ode from the diagoal site of the 2D mesh structure, which has bee orgaized i quorums. This is because it is easy to access the database because of its middle locatio i the quorum. We use Java to ru this replicatio protocol. The paper is orgaized as follows. Sectio two itroduces Diagoal Replicatio i 2D Mesh (DR2M) protocol as a ew replica cotrol protocol. Sectio three, illustrates the DR2M algorithm. Sectio four discusses the results by comparig DR2M with the existig protocols ad the paper eds with a coclusio. 2 Diagoal Replicatio i 2D Mesh (DR2M) Protocol I our protocol, all odes are logically orgaized ito two dimesioal mesh structures. We assume that the replica copies are i the form of data files ad all odes are operatioal meaig that the copy at the odes is available. The data file is replicated to oly oe middle ode at the diagoal site of each quorum. This protocol uses quorum to arrage odes i cluster. Votig approach assiged every copy of replicated data object a certai umber of votes ad a trasactio has to collect a read quorum of r votes to read a data object, ad a write quorum of w votes to write the data object. I this approach the quorum must satisfy two costraits which are r + w must be larger tha the total umber of votes, v assiged to the copies of the data object ad w > v/2 [8]. Quorum is groupig the odes or databases as show i Fig. 2. This figure illustrates how the quorums for etwork size of 81 odes are grouped by odes of 5 x 5 i each quorum. Nodes which are formed i a quorum itersect with other quorums. This is to esure that these quorums ca read or write other data from other odes which are i aother quorum. The umber of odes grouped i a quorum, q must be odd so that oly oe middle ode from the diagoal site ca be selected such as site s(3,3) colored i black circles i Fig. 2. Site s(3,3) has the copy of the data file for read ad write operatio to be executed. Defiitio 2.1. Assume that a database system cosists of x odes that are logically orgaized i the form of two dimesioal grid structures. All sites are labeled s(i,j), 1 i, 1 j. The diagoal site of s(i,j) is s(,), where = 1, 2,,. From Fig. 2, for q1, the odes of the diagoal site, D(s) is {s(1,1), s(2,2), s(3,3), s(4,4), s(5,5)} i each quorum ad the middle ode s(3,3) has the copy of the data file. This figure shows that 81 odes have four quorums where each quorum actually itersects with each other. Node e i q1 is actually ode a i q2 ad ode e i q3 is actually ode a i q4 ad etc. Sice the data file is replicated oly o oe ode for each quorum, thus it miimizes the umber of database operatios. The selected ode i the diagoal sites is assiged with vote oe or vote zero. A vote assigmet o grid, B, is a fuctio such that, B(s(i,j)) {0, 1}, 1 i, 1 j where B(s(i,j)) is the vote assiged to site s(i,j). This assigmet is treated as a allocatio of replicated copies ad a vote assiged to the site results i a copy allocated at the diagoal site. That is,

4 382 R. Latip et al. 1 vote 1 copy. Let L B = B(s(i,j)), s(i,j) D(s) where L B is the total umber of votes assiged to the selected ode as a primary replica i each quorum. Thus L B = 1 i each quorum. q1 q2 s(1,1) s(1,1) a b c d e a b c d e s(2,2) s(2,2) f g h i j f g h i j s(3,3) s(3,3) k l m o k l m o s(4,4) s (4,4) p q r s t p q r s t s(1,1) u v w x a b c d s(5,5) y e u s(1,1) a v b w c x d s(5,5) y e s(2,2) s(2,2) f g h i j f g h i j s(3,3) s(3,3) k l m o k l m o s(4,4) s(4,4) p q r s t p q r s t s(5,5) s(5,5) u v w x y u v w x y q3 q4 Fig. 2. A grid orgaizatio with 81 odes, each of the ode has a data file a, b,, ad y, respectively Let r ad w deote the read quorum ad write quorum, respectively. To esure that read operatio always gets the updated data, r + w must be greater tha the total umber of votes assiged to all sites. To make sure the cosistecy is obtaied, the followig coditios must be fulfilled [8]. i. 1 r L B, 1 w L B ii. r + w = L B + 1. These two coditios esure that there is a oempty itersectio of copies betwee read ad write quorums. Thus, these coditios esure that a read operatio accesses the most recetly updated copy of the replicated data. Let S(B) = {s(i,j) B(s(i,j)) = 1, 1 i, 1 j } where i = j Defiitio 2.2. For a quorum q, a quorum group is ay subset of S(B) where the size is greater tha or equal to q. The collectio of quorum group is defied as the quorum set.

5 Quorum Based Data Replicatio i Grid Eviromet 383 Let Q(B m,q) be the quorum set with respect to assigmet B ad quorum q, the Q(B m,q) = {G G S(B) ad G q}. For example, from Fig. 2, let site s(3,3) be the primary database of the master data file m. Its diagoal sites are s(1,1), s(2,2), s(3,3), s(4,4), ad s(5,5). Cosider a assigmet B for the data file m, where B m (s(i,j)) is the vote assiged to site s(i,j) ad L B,m is the total umber of votes assiged to primary database i each quorum which is (s(3,3)) for data file m, such that B m (s(1,1)) = B m (s(2,2)) = B m (s(3,3)) = B m (s(4,4)) = B m (s(5,5)) = 1 ad L B,m = B m (s(3,3)). Therefore, S(B) = {s(3,3)}. For simplicity, a read quorum for the data file m, is equal to write quorum. The quorum sets for read ad write operatios are Q(B m,q1), Q(B m,q2), Q(B m,q3), ad Q(B m,q4), respectively, where Q(B m,q1) = {s(3,3)}, Q(B m,q2) = {s(3,3)}, Q(B m,q3) = {s(3,3)}, ad Q(B m,q4) = {s(3,3)}. Therefore, the umber of replicated data file m is four. 3 DR2M Algorithm DR2M is developed usig Java. The algorithm of the model is as i Fig. 3, where it shows the flow of the protocol. For the developmet of the simulatio some assumptios were made such as the etwork has o failure ad odes are accessible. To aalyze the performace of read ad write availability, below are the equatios where is the 2D mesh colum or row size, example is 7, thus 7 x 7 odes of grid is the etwork size ad p is the probability of data available which is betwee 0 to 1 whereas, q is the umber of quorum for a certai operatio such as read or write operatio. Eq. (1) is to calculate the data availability. i i Av, q = ( p (1 p) ) (1) i = q i Mai Iput umber of row or colum, N If N is odd iteger the Fid the umber of quorum, Q Q = 10 Fid umber of odes i each quorum, X X = Q Get the ext odd iteger after X Select the middle replica, R Copy the data file at R Else add oe virtual colum ad row, Col ew + Row New N = Col ew * Row New the Retur N to Mai. Fig. 3. Algorithm of DR2M protocol

6 384 R. Latip et al. A larger etwork has more quorums. The umber of colums ad rows i each quorum must be odd, to get the middle replica. DR2M protocol assumes all odes have the same data access level ad request umber. Fig. 3 is the algorithm for DR2M protocol. It illustrates how the algorithm is desiged ad implemeted. For Fig. 3, the umber of odes i the etwork must be odd ad if it is a eve umber the a virtual colum ad row is added meaig a empty ode of rows ad colum are located to make the selectio of the middle ode easier. To fid the best umber of quorum, Q, for the whole etwork size, x, Eq. (2) is used where is the umber of odes for row or colum. Q = 10 (2) For obtaiig the best umber of odes for each quorum, X, Eq. (3) is used where the umber of odes must be odd to make the selectio of the middle ode easy ad if X is ot odd the X will be the ext odd umber after /Q. X = (3) Q After the selected ode is chose, the data file is copied where it acts as a primary database for that particular quorum. Some protocol depeds o the frequet usage of the data to select that particular ode as the primary database. But for this protocol, a assumptio is made where every ode has the same level of data access ad umber of request. 4 Results ad Discussio I this sectio, DR2M protocol is compared with the results of read ad write availability of the existig protocols, amely: ROWA, VT, TQ, GC, ad NRG. Fig. 4 shows the results of read availability i 81 odes of etwork size. ROWA protocol has the higher read availability about average of 2.425% for probability of data accessig betwee 0.1 to 0.9 eve whe the umber of odes is icreased. This is because oly oe replica is accessed by a read operatio for all odes of etwork size but ROWA has the lowest write availability. Fig. 5 proves that the DR2M protocol has 4.163% higher of write availability for all probabilities of data accessig. This is due to the fact that replicas are selected from the middle locatio of all odes i each quorum ad by usig quorum approach helps to reduce the umber of copies i a large etwork. Fig. 5 illustrates the write availability for 81 umbers of odes, where the probability is from 0.1 to 0.9.

7 Quorum Based Data Replicatio i Grid Eviromet 385 Availability (Read) Vs Probability Availability (Read) ROWA VT TQ GC NRG DR2M Probability Fig. 4. Read availability results for existig protocols Availability (Write) Vs Probability 1.2 Availability (Write) ROWA VT TQ GC NRG DR2M Probability Fig. 5. Write availability results for existig protocols 6 Coclusios I this paper, DR2M protocol selects a primary database from the middle locatio of the diagoal site where the odes are orgaized i structure of 2D Mesh. By gettig the best umber of quorum ad usig the votig techiques have improved the availability for write operatio compared to all protocols ad has higher read availability compared to the latest techique, NRG. I the future, we will ivestigate the respose time to access a rage of data size i the grid eviromet ad this ivestigatio will be used to evaluate the performace of our DR2M protocol. Ackowledgemets. We would like to thak the Malaysia Miistry of Sciece, Techology ad Iovatio (MOSTI) for supportig our project uder the Fudametal Grat No: FR.

8 386 R. Latip et al. Refereces 1. Krauter, K., Buyya, R., Maheswara, M.: A Taxaomy ad Survey of Grid Resource Maagemet Systems for Distributed Computig. Iteratioal Joural of Software Practice ad Experiece 32(2), (2002) 2. Foster, I., Kesselma, C., Nick, J., Tuecke, S.: Grid Services for Distributed System Itegratio. Computer 35(6), (2002) 3. Ragaatha, K., Foster, I.: Idetifyig Dyamic Replicatio Strategies for a High Performace Data Grid. I: Iteratioal Workshop o Grid Computig, Dever (2001) 4. Lamehamedi, H., Szymaski, B., Shetu, Z., Deelma, E.: Data Replicatio Strategies i Grid Eviromet. I: ICAP 2003, pp IEEE Computer Sciece Press, Los Alamitos (2002) 5. Lamehamedi, H., Shetu, Z., Szymaski, B.: Simulatio of Dyamic Data Replicatio Strategies i Data Grids. I: The 17th Iteratioal Symposium o Parallel ad Distributed Processig, pp (2003) 6. Lamehamedi, H.: Decetralized Data Maagemet Framework for Data Grids. Ph.D. thesis, Resselaer Polytechic Istitute Troy, New York (2005) 7. Agrawal, D., El Abbadi, A.: Usig Recofiguratio for Efficiet Maagemet of Replicated Data. IEEE Trasactios o Kowledge ad Data Egieerig 8(5), (1996) 8. Mat Deris, M.: Efficiet Access of Replicatio Data i Distributed Database Systems. Thesis PhD, Uiversiti Putra Malaysia (2001) 9. Agrawal, D., El Abbadi, A.: The Geeralized Tree Quorum Protocol: A Efficiet Approach for Maagig Replicated Data. ACM Trasactios Database System 17(4), (1992) 10. Agrawal, D., El Abbadi, A.: The Tree Quorum Protocol: A Efficiet Approach for Maagig Replicated Data. I: 16th Iteratioal Coferece o Very Large databases, pp (1990) 11. Maekawa, M.: A Algorithm for Mutual Exclusio i Decetralized Systems. ACM Trasactios Computer System 3(2), (1992) 12. Cheug, S.Y., Ammar, M.H., Ahmad, M.: The Grid Protocol: A High Performace Schema for Maitaiig Replicated Data. IEEE Trasactios o Kowledge ad Data Egieerig 4(6), (1992) 13. Mat Deris, M., Evas, D.J., Sama, M.Y., Ahmad, N.: Biary Vote Assigmet o Grid For Efficiet Access of Replicated Data. It l Joural of Computer Mathematics, (2003) 14. Mat Deris, M., Abawajy, J.H., Suzuri, H.M.: A Efficiet Replicated Data Access Approach for Large Scale Distributed Systems. I: IEEE/ACM Cof. o Cluster Computig ad Grid, Chicago, USA (2004) 15. Ahamad, N., Mat Deris, M.: Maagig Neighbor Replicatio Trasactios i Distributed Systems. I: DCABES 2006, Chia (2006) 16. Kuszt, P., Laure, E., Stockiger, H., Stockiger, K.: Advaced Replica Maagemet with Reptor. I: CERN, Europea Orgaizatio for Nuclear Research, CH-1211 Geeva 23, Switzerlad (2000) 17. Mat Deris, M., Abawajy, J.H., Mamat, A.: A Efficiet Replicated Data Access Approach for Large-scale Distributed Systems. Future Geeratio Computer Systems 24, 1 9 (2007) 18. Jimeez-Peris, R., et al.: Are Quorums a Alterative for Data Replicatio? ACM Trasactios o Database Systems 28(3) (2003)

High Availability with Diagonal Replication in 2D Mesh (DR2M) Protocol for Grid Environment

High Availability with Diagonal Replication in 2D Mesh (DR2M) Protocol for Grid Environment High Availability with Diagoal Replicatio i 2D Mesh (DR2M) Protocol for Grid Eviromet Rohaya Latip (Correspodig author) Faculty of Computer Sciece ad Iformatio Techology Uiversiti Putra Malaysia Tel: 60-3-8946-6536

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

An Algorithm to Solve Multi-Objective Assignment. Problem Using Interactive Fuzzy. Goal Programming Approach

An Algorithm to Solve Multi-Objective Assignment. Problem Using Interactive Fuzzy. Goal Programming Approach It. J. Cotemp. Math. Scieces, Vol. 6, 0, o. 34, 65-66 A Algorm to Solve Multi-Objective Assigmet Problem Usig Iteractive Fuzzy Goal Programmig Approach P. K. De ad Bharti Yadav Departmet of Mathematics

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

arxiv: v2 [cs.ds] 24 Mar 2018

arxiv: v2 [cs.ds] 24 Mar 2018 Similar Elemets ad Metric Labelig o Complete Graphs arxiv:1803.08037v [cs.ds] 4 Mar 018 Pedro F. Felzeszwalb Brow Uiversity Providece, RI, USA pff@brow.edu March 8, 018 We cosider a problem that ivolves

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

Cubic Polynomial Curves with a Shape Parameter

Cubic Polynomial Curves with a Shape Parameter roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad

More information

Lecture 1: Introduction and Strassen s Algorithm

Lecture 1: Introduction and Strassen s Algorithm 5-750: Graduate Algorithms Jauary 7, 08 Lecture : Itroductio ad Strasse s Algorithm Lecturer: Gary Miller Scribe: Robert Parker Itroductio Machie models I this class, we will primarily use the Radom Access

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 18 Strategies for Query Processig Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio DBMS techiques to process a query Scaer idetifies

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis

Redundancy Allocation for Series Parallel Systems with Multiple Constraints and Sensitivity Analysis IOSR Joural of Egieerig Redudacy Allocatio for Series Parallel Systems with Multiple Costraits ad Sesitivity Aalysis S. V. Suresh Babu, D.Maheswar 2, G. Ragaath 3 Y.Viaya Kumar d G.Sakaraiah e (Mechaical

More information

A Hierarchical Load Balanced Fault tolerant Grid Scheduling Algorithm with User Satisfaction

A Hierarchical Load Balanced Fault tolerant Grid Scheduling Algorithm with User Satisfaction A Hierarchical Load Balaced Fault tolerat Grid Schedulig Algorithm with User Satisfactio 1 KEERTHIKA P, 2 SURESH P Assistat Professor (Seior Grade), Departmet o Computer Sciece ad Egieerig Assistat Professor

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

1 Enterprise Modeler

1 Enterprise Modeler 1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio

More information

GPUMP: a Multiple-Precision Integer Library for GPUs

GPUMP: a Multiple-Precision Integer Library for GPUs GPUMP: a Multiple-Precisio Iteger Library for GPUs Kaiyog Zhao ad Xiaowe Chu Departmet of Computer Sciece, Hog Kog Baptist Uiversity Hog Kog, P. R. Chia Email: {kyzhao, chxw}@comp.hkbu.edu.hk Abstract

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

n Explore virtualization concepts n Become familiar with cloud concepts

n Explore virtualization concepts n Become familiar with cloud concepts Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to

More information

BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM

BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM MATEC Web of Cofereces 79, 01014 (016) DOI: 10.1051/ mateccof/0167901014 T 016 BOOLEAN DIFFERENTIATION EQUATIONS APPLICABLE IN RECONFIGURABLE COMPUTATIONAL MEDIUM Staislav Shidlovskiy 1, 1 Natioal Research

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties

The Counterchanged Crossed Cube Interconnection Network and Its Topology Properties WSEAS TRANSACTIONS o COMMUNICATIONS Wag Xiyag The Couterchaged Crossed Cube Itercoectio Network ad Its Topology Properties WANG XINYANG School of Computer Sciece ad Egieerig South Chia Uiversity of Techology

More information

Fuzzy Minimal Solution of Dual Fully Fuzzy Matrix Equations

Fuzzy Minimal Solution of Dual Fully Fuzzy Matrix Equations Iteratioal Coferece o Applied Mathematics, Simulatio ad Modellig (AMSM 2016) Fuzzy Miimal Solutio of Dual Fully Fuzzy Matrix Equatios Dequa Shag1 ad Xiaobi Guo2,* 1 Sciece Courses eachig Departmet, Gasu

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 9. Pointers and Dynamic Arrays. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 9 Poiters ad Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 9.1 Poiters 9.2 Dyamic Arrays Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Slide 9-3

More information

Architectural styles for software systems The client-server style

Architectural styles for software systems The client-server style Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS

More information

INTERSECTION CORDIAL LABELING OF GRAPHS

INTERSECTION CORDIAL LABELING OF GRAPHS INTERSECTION CORDIAL LABELING OF GRAPHS G Meea, K Nagaraja Departmet of Mathematics, PSR Egieerig College, Sivakasi- 66 4, Virudhuagar(Dist) Tamil Nadu, INDIA meeag9@yahoocoi Departmet of Mathematics,

More information

CHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs

CHAPTER IV: GRAPH THEORY. Section 1: Introduction to Graphs CHAPTER IV: GRAPH THEORY Sectio : Itroductio to Graphs Sice this class is called Number-Theoretic ad Discrete Structures, it would be a crime to oly focus o umber theory regardless how woderful those topics

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

Solving Fuzzy Assignment Problem Using Fourier Elimination Method

Solving Fuzzy Assignment Problem Using Fourier Elimination Method Global Joural of Pure ad Applied Mathematics. ISSN 0973-768 Volume 3, Number 2 (207), pp. 453-462 Research Idia Publicatios http://www.ripublicatio.com Solvig Fuzzy Assigmet Problem Usig Fourier Elimiatio

More information

LU Decomposition Method

LU Decomposition Method SOLUTION OF SIMULTANEOUS LINEAR EQUATIONS LU Decompositio Method Jamie Traha, Autar Kaw, Kevi Marti Uiversity of South Florida Uited States of America kaw@eg.usf.edu http://umericalmethods.eg.usf.edu Itroductio

More information

A Reinforced Hungarian Algorithm for Task Allocation in Global Software Development

A Reinforced Hungarian Algorithm for Task Allocation in Global Software Development A Reiforced Hugaria Algorithm for Task Allocatio i Global Software Developmet Xiao Yu State Key Lab. of Software Egieerig, Computer School, Wuha Uiversity, Wuha, Chia xiaoyu_whu@yahoo.com Ma Wu School

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

On Infinite Groups that are Isomorphic to its Proper Infinite Subgroup. Jaymar Talledo Balihon. Abstract

On Infinite Groups that are Isomorphic to its Proper Infinite Subgroup. Jaymar Talledo Balihon. Abstract O Ifiite Groups that are Isomorphic to its Proper Ifiite Subgroup Jaymar Talledo Baliho Abstract Two groups are isomorphic if there exists a isomorphism betwee them Lagrage Theorem states that the order

More information

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago

CMSC Computer Architecture Lecture 12: Virtual Memory. Prof. Yanjing Li University of Chicago CMSC 22200 Computer Architecture Lecture 12: Virtual Memory Prof. Yajig Li Uiversity of Chicago A System with Physical Memory Oly Examples: most Cray machies early PCs Memory early all embedded systems

More information

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks Iterferece Aware Chael Assigmet Scheme i Multichael Wireless Mesh Networks Sumyeg Kim Departmet of Computer Software Egieerig Kumoh Natioal Istitute of Techology Gum South Korea Abstract Wireless mesh

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

Evaluation of Support Vector Machine Kernels for Detecting Network Anomalies

Evaluation of Support Vector Machine Kernels for Detecting Network Anomalies Evaluatio of Support Vector Machie Kerels for Detectig Network Aomalies Prera Batta, Maider Sigh, Zhida Li, Qigye Dig, ad Ljiljaa Trajković Commuicatio Networks Laboratory http://www.esc.sfu.ca/~ljilja/cl/

More information

Course Site: Copyright 2012, Elsevier Inc. All rights reserved.

Course Site:   Copyright 2012, Elsevier Inc. All rights reserved. Course Site: http://cc.sjtu.edu.c/g2s/site/aca.html 1 Computer Architecture A Quatitative Approach, Fifth Editio Chapter 2 Memory Hierarchy Desig 2 Outlie Memory Hierarchy Cache Desig Basic Cache Optimizatios

More information

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem

Exact Minimum Lower Bound Algorithm for Traveling Salesman Problem Exact Miimum Lower Boud Algorithm for Travelig Salesma Problem Mohamed Eleiche GeoTiba Systems mohamed.eleiche@gmail.com Abstract The miimum-travel-cost algorithm is a dyamic programmig algorithm to compute

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045 Oe Brookigs Drive St. Louis, Missouri 63130-4899, USA jaegerg@cse.wustl.edu

More information

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection 2017 Asia-Pacific Egieerig ad Techology Coferece (APETC 2017) ISBN: 978-1-60595-443-1 Otology-based Decisio Support System with Aalytic Hierarchy Process for Tour Pacage Selectio Tie-We Sug, Chia-Jug Lee,

More information

Counting the Number of Minimum Roman Dominating Functions of a Graph

Counting the Number of Minimum Roman Dominating Functions of a Graph Coutig the Number of Miimum Roma Domiatig Fuctios of a Graph SHI ZHENG ad KOH KHEE MENG, Natioal Uiversity of Sigapore We provide two algorithms coutig the umber of miimum Roma domiatig fuctios of a graph

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua

Mobile terminal 3D image reconstruction program development based on Android Lin Qinhua Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 05) Mobile termial 3D image recostructio program developmet based o Adroid Li Qihua Sichua Iformatio Techology College

More information

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 6 Special Issue o Logistics, Iformatics ad Service Sciece Sofia 2015 Prit ISSN: 1311-9702; Olie ISSN: 1314-4081 DOI:

More information

Package popkorn. R topics documented: February 20, Type Package

Package popkorn. R topics documented: February 20, Type Package Type Pacage Pacage popkor February 20, 2015 Title For iterval estimatio of mea of selected populatios Versio 0.3-0 Date 2014-07-04 Author Vi Gopal, Claudio Fuetes Maitaier Vi Gopal Depeds

More information

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance

Pseudocode ( 1.1) Analysis of Algorithms. Primitive Operations. Pseudocode Details. Running Time ( 1.1) Estimating performance Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Pseudocode ( 1.1) High-level descriptio of a algorithm More structured

More information

Outline n Introduction n Background o Distributed DBMS Architecture

Outline n Introduction n Background o Distributed DBMS Architecture Outlie Itroductio Backgroud o Distributed DBMS Architecture Datalogical Architecture Implemetatio Alteratives Compoet Architecture o Distributed DBMS Architecture o Distributed Desig o Sematic Data Cotrol

More information

Hashing Functions Performance in Packet Classification

Hashing Functions Performance in Packet Classification Hashig Fuctios Performace i Packet Classificatio Mahmood Ahmadi ad Stepha Wog Computer Egieerig Laboratory Faculty of Electrical Egieerig, Mathematics ad Computer Sciece Delft Uiversity of Techology {mahmadi,

More information

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1

COSC 1P03. Ch 7 Recursion. Introduction to Data Structures 8.1 COSC 1P03 Ch 7 Recursio Itroductio to Data Structures 8.1 COSC 1P03 Recursio Recursio I Mathematics factorial Fiboacci umbers defie ifiite set with fiite defiitio I Computer Sciece sytax rules fiite defiitio,

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

An Algorithm to Solve Fuzzy Trapezoidal Transshipment Problem

An Algorithm to Solve Fuzzy Trapezoidal Transshipment Problem Iteratioal Joural of Systems Sciece ad Applied Mathematics 206; (4): 58-62 http://www.sciecepublishiggroup.com/j/ssam doi: 0.648/j.ssam.206004.4 A Algorithm to Solve Fuzzy Trapezoidal Trasshipmet Problem

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

How do we evaluate algorithms?

How do we evaluate algorithms? F2 Readig referece: chapter 2 + slides Algorithm complexity Big O ad big Ω To calculate ruig time Aalysis of recursive Algorithms Next time: Litterature: slides mostly The first Algorithm desig methods:

More information

Mapping Publishing and Mapping Adaptation in the Middleware of Railway Information Grid System

Mapping Publishing and Mapping Adaptation in the Middleware of Railway Information Grid System Mappig Publishig ad Mappig Adaptatio i the Middleware of Railway Iformatio Grid ystem You Gamei, Liao Huamig, u Yuzhog Istitute of Computig Techology, Chiese Academy of cieces, Beijig 00080 gameiu@ict.ac.c

More information

Mean cordiality of some snake graphs

Mean cordiality of some snake graphs Palestie Joural of Mathematics Vol. 4() (015), 49 445 Palestie Polytechic Uiversity-PPU 015 Mea cordiality of some sake graphs R. Poraj ad S. Sathish Narayaa Commuicated by Ayma Badawi MSC 010 Classificatios:

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5. Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

A Boolean Query Processing with a Result Cache in Mediator Systems

A Boolean Query Processing with a Result Cache in Mediator Systems A Boolea Query Processig with a Result Cache i Mediator Systems Jae-heo Cheog ad Sag-goo Lee * Departmet of Computer Sciece Seoul Natioal Uiversity Sa 56-1 Shillim-dog Kwaak-gu, Seoul Korea {cjh, sglee}cygus.su.ac.kr

More information

MapReduce and Hadoop. Debapriyo Majumdar Data Mining Fall 2014 Indian Statistical Institute Kolkata. November 10, 2014

MapReduce and Hadoop. Debapriyo Majumdar Data Mining Fall 2014 Indian Statistical Institute Kolkata. November 10, 2014 MapReduce ad Hadoop Debapriyo Majumdar Data Miig Fall 2014 Idia Statistical Istitute Kolkata November 10, 2014 Let s keep the itro short Moder data miig: process immese amout of data quickly Exploit parallelism

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

BOOLEAN MATHEMATICS: GENERAL THEORY

BOOLEAN MATHEMATICS: GENERAL THEORY CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Neural Networks A Model of Boolean Functions

Neural Networks A Model of Boolean Functions Neural Networks A Model of Boolea Fuctios Berd Steibach, Roma Kohut Freiberg Uiversity of Miig ad Techology Istitute of Computer Sciece D-09596 Freiberg, Germay e-mails: steib@iformatik.tu-freiberg.de

More information

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c Iteratioal Coferece o Computatioal Sciece ad Egieerig (ICCSE 015) Harris Corer Detectio Algorithm at Sub-pixel Level ad Its Applicatio Yuafeg Ha a, Peijiag Che b * ad Tia Meg c School of Automobile, Liyi

More information

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis Extedig The Sleuth Kit ad its Uderlyig Model for Pooled File System Foresic Aalysis Frauhofer Istitute for Commuicatio, Iformatio Processig ad Ergoomics Ja-Niclas Hilgert* Marti Lambertz Daiel Plohma ja-iclas.hilgert@fkie.frauhofer.de

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

THIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS. Roman Szewczyk

THIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS. Roman Szewczyk THIN LAYER ORIENTED MAGNETOSTATIC CALCULATION MODULE FOR ELMER FEM, BASED ON THE METHOD OF THE MOMENTS Roma Szewczyk Istitute of Metrology ad Biomedical Egieerig, Warsaw Uiversity of Techology E-mail:

More information

Optimal Mapped Mesh on the Circle

Optimal Mapped Mesh on the Circle Koferece ANSYS 009 Optimal Mapped Mesh o the Circle doc. Ig. Jaroslav Štigler, Ph.D. Bro Uiversity of Techology, aculty of Mechaical gieerig, ergy Istitut, Abstract: This paper brigs out some ideas ad

More information

A Parallel DFA Minimization Algorithm

A Parallel DFA Minimization Algorithm A Parallel DFA Miimizatio Algorithm Ambuj Tewari, Utkarsh Srivastava, ad P. Gupta Departmet of Computer Sciece & Egieerig Idia Istitute of Techology Kapur Kapur 208 016,INDIA pg@iitk.ac.i Abstract. I this

More information

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Y.K. Patil* Iteratioal Joural of Advaced Research i ISSN: 2278-6244 IT ad Egieerig Impact Factor: 4.54 HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Prof. V.S. Nadedkar** Abstract: Documet clusterig is

More information

CORD Test Project in Okinawa Open Laboratory

CORD Test Project in Okinawa Open Laboratory CORD Test Project i Okiawa Ope Laboratory Fukumasa Morifuji NTT Commuicatios Trasform your busiess, trasced expectatios with our techologically advaced solutios. Ageda VxF platform i NTT Commuicatios Expectatio

More information

Service Oriented Enterprise Architecture and Service Oriented Enterprise

Service Oriented Enterprise Architecture and Service Oriented Enterprise Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE

More information

A New Bit Wise Technique for 3-Partitioning Algorithm

A New Bit Wise Technique for 3-Partitioning Algorithm Special Issue of Iteratioal Joural of Computer Applicatios (0975 8887) o Optimizatio ad O-chip Commuicatio, No.1. Feb.2012, ww.ijcaolie.org A New Bit Wise Techique for 3-Partitioig Algorithm Rajumar Jai

More information

Schema for the DCE Security Registry Server

Schema for the DCE Security Registry Server Schema for the Security egistry Server Versio Date: 0/20/00 For questios or commets cocerig this documet, sed a email ote to dce-ldap@opegroup.org or call Doa Skibbie at 52 838-3896. . Itroductio...3 2.

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet

More information

An Efficient Algorithm for Graph Bisection of Triangularizations

An Efficient Algorithm for Graph Bisection of Triangularizations Applied Mathematical Scieces, Vol. 1, 2007, o. 25, 1203-1215 A Efficiet Algorithm for Graph Bisectio of Triagularizatios Gerold Jäger Departmet of Computer Sciece Washigto Uiversity Campus Box 1045, Oe

More information

USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES

USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES USING LATTICE TO DYNAMICALLY PREVENT INFORMATION LEAKAGE FOR WEB SERVICES Shih-Chie Chou Departmet of Computer Sciece ad Iformatio Egieerig, Natioal Dog Hwa Uiversity, Taiwa ABSTRACT The use of web services

More information

A study on Interior Domination in Graphs

A study on Interior Domination in Graphs IOSR Joural of Mathematics (IOSR-JM) e-issn: 2278-5728, p-issn: 219-765X. Volume 12, Issue 2 Ver. VI (Mar. - Apr. 2016), PP 55-59 www.iosrjourals.org A study o Iterior Domiatio i Graphs A. Ato Kisley 1,

More information

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs

What are we going to learn? CSC Data Structures Analysis of Algorithms. Overview. Algorithm, and Inputs What are we goig to lear? CSC316-003 Data Structures Aalysis of Algorithms Computer Sciece North Carolia State Uiversity Need to say that some algorithms are better tha others Criteria for evaluatio Structure

More information

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk

More information

Dynamic Programming and Curve Fitting Based Road Boundary Detection

Dynamic Programming and Curve Fitting Based Road Boundary Detection Dyamic Programmig ad Curve Fittig Based Road Boudary Detectio SHYAM PRASAD ADHIKARI, HYONGSUK KIM, Divisio of Electroics ad Iformatio Egieerig Chobuk Natioal Uiversity 664-4 Ga Deokji-Dog Jeoju-City Jeobuk

More information

Data diverse software fault tolerance techniques

Data diverse software fault tolerance techniques Data diverse software fault tolerace techiques Complemets desig diversity by compesatig for desig diversity s s limitatios Ivolves obtaiig a related set of poits i the program data space, executig the

More information

Oracle Server. What s New in this Release? Release Notes

Oracle  Server. What s New in this Release? Release Notes Oracle email Server Release Notes Release 5.2 for Widows NT May 2001 Part No. A90426-01 These release otes accompay Oracle email Server Release 5.2 for Widows NT. They cotai the followig topics: What s

More information

On Nonblocking Folded-Clos Networks in Computer Communication Environments

On Nonblocking Folded-Clos Networks in Computer Communication Environments O Noblockig Folded-Clos Networks i Computer Commuicatio Eviromets Xi Yua Departmet of Computer Sciece, Florida State Uiversity, Tallahassee, FL 3306 xyua@cs.fsu.edu Abstract Folded-Clos etworks, also referred

More information

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao

More information

Review: The ACID properties

Review: The ACID properties Recovery Review: The ACID properties A tomicity: All actios i the Xactio happe, or oe happe. C osistecy: If each Xactio is cosistet, ad the DB starts cosistet, it eds up cosistet. I solatio: Executio of

More information

Combination Labelings Of Graphs

Combination Labelings Of Graphs Applied Mathematics E-Notes, (0), - c ISSN 0-0 Available free at mirror sites of http://wwwmaththuedutw/ame/ Combiatio Labeligs Of Graphs Pak Chig Li y Received February 0 Abstract Suppose G = (V; E) is

More information