DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

Size: px
Start display at page:

Download "DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson"

Transcription

1 DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, Chalmes Univesity of Technology, Gothenbug, Sweden, Abstact: A Peti net based appoach fo the modeling of batch plants as well as poducts is pesented. Allocating non-shaable esouces fo poduct ecipes can lead to deadlocks. In this pape we focus on the detection of potential deadlock situations using a gaph stuctue deived fom synchonization issues that aise when moving a batch between esouces. It is shown that diffeent gaph pattens define potential deadlocks. These pattens even suggest how to implement a Peti net supeviso to avoid these deadlocks. Keywods: Peti nets, gaph theoetic models, supevisoy contol, modelling. INTRODUCTION Batch pocesses take an impotant place in pocess industies. A batch pocess involves a sequence of opeations that ae caied out on a discete quantity of mateial within a piece of opeating equipment. A ecipe specifies the sequence of opeations to be executed and all possible ways the plant can by utilized in ode to poduce the desied poduct. A discete supeviso can be used to coodinate the simultaneous execution of a numbe of ecipes within the same plant. Its task is to ensue that all ecipes can be teminated coectly, i.e. it pevents actions that will lead the system into a deadlock. This is done by allowing/disallowing the ecipes access to the plant s diffeent esouces. Thus, the task of the supeviso is to pevent esouce allocations that can lead to deadlock. Note that the poposed supeviso should only pevent allocations if they can lead to a deadlock. If thee ae seveal possible paths though the plant it is not the task of the supeviso to choose one of them. Instead, this is done by a schedule, e.g., an optimization algoithm, o a human opeato, and is outside the scope of this pape. Deadlock avoidance techniques can, if desied, esult in minimally estictive solutions, i.e., nothing moe than necessay is pevented. The main dawback with deadlock avoidance is that it is computationally expensive. In fact, if a minimally estictive solution is equied, deadlock avoidance belongs to the class of NP-had poblems and is thus computationally intactable fo aleady elatively small poblems. We use Peti nets as ou modeling tools fo ecipes as well as esouces. The task of avoiding deadlocks can then be divided into two pats: the identification of potential deadlock situations and the fomulation of estictions (placement of monitos to avoid these deadlocks. Holloway et al. (997 give an oveview ove the wok that has been done to implement contol mechanisms based on aleady existing mutual exclusion constaints. Thee ae, howeve, fewe esults available that focus on the identification of these constaints. In this pape we divide the plant into two sub-systems: pocessos (units and the tanspoting system esponsible fo mateial tansfes. It is shown that it is enough to solve the deadlock poblem in these two sub-systems sepaately, thus educing the oveall computational complexity consideably. In Tittus and Lennatson (998a and Åkesson and Tittus (998 diffeent techniques have been pesented to solve the deadlock poblem in the tanspoting system. Hee, we concentate on the identification of deadlocks that can occu when booking pocessos. Using coloed diected gaphs to descibe the booking poblem we identify gaph pattens that define potential deadlocks fo a esticted class of poblems. Futhemoe we show that these gaph pattens even detemine the placement of so-called monitos to avoid deadlocks. It is woth mentioning that the poposed methodology to detect and esolve deadlocks is not esticted to batch pocesses but to evey kind of pocesses booking nonshaable esouces in the way specified in the pape. We stat by biefly eviewing the plant and ecipe models peviously intoduced in Tittus and Åkesson (997, 999. They focus on esouce allocation and synchonization issues. Next, potential deadlock situations ae pointed out and chaacteized. Afte defining coloed diected gaphs, we descibe deadlock pattens and how to place Peti net (PN monitos. We conclude the pape with some outlook on futue wok. 2. MODELS We model both esouces and ecipes by means of labeled, odinay PNs because of thei explicit suppot of paallelism and modula specifications. These PN ae defined by the 7-tuple PN = fp T P e P ost m i g. P and T ae finite, non-empty sets of places p i and tansitions t i, espectively. Pe and Post ae subsets of P T and denote out-acs fom and in-acs jp to places, espectively and m i : P! Z j 0 defines

2 the initial making of the PN. is a set of events and : T! associates an event to each tansition. Futhemoe, let p and p denote the tansition afte and befoe place p, espectively. Analoguously, t and t denotes the place afte and befoe tansition t, espectively. 2. Resouce Models In this pape we distinguish between two geneic classes of plant esouces, namely pocessos and tanspot devices. Pocessos ae typically tanks, eactos and othe containe like units, fully equipped with contol modules and othe devices to manipulate a batch. Tanspot devices, on the othe hand, have as thei main task to open and close connections between pocessos, causing and peventing mateial flow. Typical examples ae valves and pumps. We exemplify pocessos with tanks and tanspoting devices with on/off valves, and use safe PN (Muata (989 as ou modeling tool. Since we use the models fo supeviso synthesis, and we only conside the booking issue, the poposed models eflect the booking status of the esouces. As mentioned in the model epesentation section, an event is associated with evey tansition. Recipes and esouces shae some events, and the pinciple is that ecipes initiate events and esouces follow them. The initiation of an event in the ecipe is only possible if the esouce tansition labeled with the same event can be fied simultaneously. Pocessos When a ecipe has booked a pocesso P i, it has full and exclusive access to P i and the associated equipment. Figue (a shows the geneic PN model of a pocesso. Initially the place UNBOOKED contains one token, indicating that this place is active. When a ecipe wants to book pocesso P i, it ties to initiate the booking event b in P i :s PN, denoted b(p i. If place UNBOOKED contains a token, the token is moved to place BOOKED, and othe ecipes ae pevented fom booking the pocesso. When the ecipe is finished with pocesso P i it initiates the unbooking event u, denoted u(p i, and othe ecipes can book the pocesso. Note that the models do not indicate whethe the pocesso cuently is executing an opeation o not. bl ( i ul ( i bt ( unbooked (a bt ( ut ( 2 (b ut ( 2 i up ( i (c booked opeation {( b P, b( L } up ( i k u( L opeation Fig.. (a Geneic model fo a pocesso P i. (b Line model L i. (c Segment of a booking ecipe moving mateial fom P i to P k via L. Tanspot devices When moving mateial fom one pocesso to the next, a numbe of valves have to coopeate to open and close cetain connections. Also, sometimes it is enough to block some tanspot devices (i.e., make sue the tanspote stays closed duing mateial tansfe in ode to secue a line fo a mateial tanspot. In this case we do not need to book the tanspote, but only pevent othe ecipes fom booking it. Thus, besides the natual states UNBOOKED and BOOKED, two exta states in which the valve is kept closed ae needed. Two block states ae needed since a valve with two outlets can be blocked by at most two ecipes, each ecipe blocking one of the valve s outlets. A valve with moe than two outlets then has a coespondingly lage numbe of places indicating blocking. In accodance with ou intoductoy discussion a set of vitual line esouces, called connection lines o just lines, is ceated. Fo each possible connection between any two pocessos a line esouce can automatically be ceated fom infomation about the plant s topology. A PN model of a line with thee tanspot devices is given in Fig. (b. The line model ensues full flexibility when booking tanspot devices. 2.2 Recipe Models Poduct models o ecipes can be specified on diffeent levels of abstaction. One can distinguish between the plant-independent geneal ecipe, which descibes the opeations to be applied without efeence to any specific equipment to be used, and the contol ecipe, which, besides the opeations, also shows the aw mateials path though a specific plant. Recipes on an even lowe abstaction level descibe the detailed contol that has to be applied. In this pape we will concentate on models fo the plant-dependent ecipe. These models then can be used togethe with the peviously intoduced plant models to synthesize a discete supeviso that coodinates the concuent execution of ecipes. Each ecipe is modeled by an individual PN. In Tittus and Åkesson (997, 999 geneic PN building blocks have been intoduced fo the following basic functions: ( opeation: diffeent phases applied to the whole batch o a pat of the batch, (2 move: moving the batch fom one unit to anothe, and, as special cases of (2: (3 join: meging of two pats of a batch fom two souce units into a thid taget unit and (4 split: sepaating a batch fom one souce unit into two taget units. Fo the pesent wok it is enough to conside the booking model fo a simple mateial tansfe between two pocessos. Figue (c shows a segment of a booking ecipe that stats with an opeation in pocesso P i (denoted by a PN place. The mateial tansfe is initiated by simultaneously booking the taget pocesso, P k, and the connecting line object, L. This booking stategy makes it possible to sepaate the deadlock analysis when booking pocessos fom the deadlock analysis in the tanspoting system. Simultaneous booking is fomalized by using the connected event fb(p i b(l g. The tansition labeled with the event connection can only be fied if all the connected

3 events can be fied at the same time. Afte the mateial tansfe has been accomplished, the line and, afte execution of optional post-pocessing, the souce pocesso ae eleased. The batch is now contained in pocesso P k whee the next opeation can take place. Thus, the booking ecipe is put togethe of these building blocks, which in tun contain events booking and unbooking pocessos and lines. 3. DEADLOCK SITUATIONS Thee ae fou necessay conditions fo deadlock to occu: ( mutual exclusion, i.e., a esouce can only be used by one pocess at a time, (2 hold and wait, i.e., pocesses must exist which ae holding esouces while waiting fo othes, (3 no pe-emption, i.e., a esouce can only be eleased voluntaily by a pocess, and (4 cicula wait, i.e., a cicula chain of pocesses must exist such that each pocess holds esouces which ae being equested by the next pocess in the chain. In ou applications, the below mentioned pocesses coespond to ecipes booking and unbooking esouces. In this section we will show that deadlock is elevant when booking pocessos and connections between them. Let us fist conside the booking of pocessos. If we deem pe-emption an unacceptable altenative then the above conditions suely apply to the booking of pocessos when moving mateial. A simple example will illustate the point. Assume two ecipes R and R 2 that need to move mateial fom pocessos P to P 2 and fom P 2 to P, espectively. If R has booked P and R 2 has booked P 2 with both ecipes now waiting fo the othe to elease the esouce, then the system has deadlocked. The poblem can also aise when booking two o moe lines that have two o moe tanspoting devices in common. If each line books one valve and then waits fo the othe valve to be eleased the system locks. The following lemma educes the complexity of the oveall system s deadlock analysis significantly and is the eason fo the division of the system into pocessos and tanspoting system. Lemma. Given the booking models intoduced in the pevious section, all possible deadlock situations can be detected consideing pocesso booking and bookings in the tanspoting system sepaately. PROOF. We have to show that all occuences of deadlocks obtained by consideing all esouces ae a subset of the deadlocks obtained by consideing each sub-system sepaately. Accoding to ou ecipe models, each ecipe has to own one o moe souce pocessos befoe attempting to book the taget pocesso and the coesponding line. We show that all cyclic waits involving both lines and pocessos ae coveed by consideing lines and pocesso booking sepaately. Thee ae two ways fo two ecipes to fom a cyclic wait involving pocessos and lines. The fist case is that both ecipes have to equie access to the same line. Since each line is defined by the pocessos it connects, this can only be the case if the pocessos fom a cyclic wait. Thus this case is coveed by deadlock analysis fo pocessos. The othe case is that deadlock between two lines can cause deadlock in the oveall booking system. Assume two ecipes, R and R 2. R has booked pocesso P and line L!2 and waits fo pocesso P 2, while R 2 has booked pocessos P 2 and P 3 and waits fo line L 2!3. Assume futhemoe that L!2 and L 2!3 cannot be booked simultaneously. This kind of situations ae uled out by the fact that the booking models equie simultaneous booking of both taget pocesso and line. The extension of the easoning to moe ecipes is staight fowad DEADLOCK AVOIDANCE Usually one distinguishes between two steps in the implementation of deadlock avoidance policies. Fist, deadlock situations need to be identified and fomulated as geneal mutual exclusion constaints (GMEC with espect to the booking of esouces. The second pat consists of the implementation of suitable mechanisms in ode to enfoce the MEC without esticting the booking behavio moe than absolutely necessay. The above mentioned GMECs can easily be implemented by monitos. A monito is a PN place whose initial making in a geneal setting epesents the numbe of available esouces. Its outgoing and incoming tansitions epesent, espectively, the acquisition and elease of these esouces (see Fig. 4. In Holloway et al. (997 can be found an oveview ove solutions to the GMEC poblem fo PNs. Avoidance policies that can be computed in polynomial time have been pesented fo the pice, howeve, that these policies in geneal give a somewhat estictive solution, i.e., the esulting supeviso is geneally not maximally pemissive. We focus now on the identification of deadlock situations aising when booking pocessos. A detailed discussion of deadlock avoidance in the tanspoting system can be found in Tittus and Lennatson (998b and Åkesson and Tittus (998. Afte some peliminaies on coloed, di-gaphs, we show how to tansfom the deadlock poblem into a gaph stuctue and identify gaph pattens that coespond to deadlocks. 4. Booking of Pocessos We will hee take a close look at pocesso booking and the infomation essential fo deadlock analysis. Assume a ecipe that consists of a staight sequence of pocessos that ae booked and unbooked. The PN in Fig. 2(a shows the sequence of booking and unbooking events that can occu unde the assumption that the whole batch is moved each time. The souce pocesso is eleased by the ecipe as soon as the batch tanspot has been completed. Even though some postpocessing might be equied befoe eleasing the pocesso, the pocesso is no longe needed by the ecipe and will soone o late be eleased. Since time does not play any ole fo ou deadlock analysis the unbooking events can be omitted and the infomation necessay fo the analysis is fomulated as a labeled PN as shown in (Fig. 2(b

4 u( P b( P3 u( P2 b( P 3 (a (b A special case of the elementay cycle is the elementay coloed cycle defined as follows: Definition 4. An elementay coloed cycle (ECC is an elementay cycle whee no two edges have the same colo. Fig. 2. Event eduction in a booking sequence fo deadlock-analysis puposes Fo analysis puposes we define the pocesso-waitelationship. A pocesso P is said to wait fo a i pocesso P 2 in a ecipe i, denoted P! P 2,if the availability of P 2 is an immediate equiement fo the elease of P in ecipe i. The thus defined binay pocesso-wait elation is non-symmetic and non-tansitive. Fo a given system with a numbe of ecipes, all the pocesso-wait elations can be captued in a coloed digaph, which we will denote the pocesso-wait elationship gaph (PWRG. 4.2 The Pocesso-Wait-Relationship Gaph Definition 2. A coloed digaph is given by the quatuple G C = fv E C g. V = fv ::: v n g denotes the set of nodes, E = fe ::: e m g the set of edges and C = f ::: p g the set of colos which is identical to the set of ecipes. The patial function : (V E C! V defines the stuctue of the gaph including the coloing of the edges. The gaph s nodes v i 2 V coespond to the system s pocessos P i 2P, the one-to-one mapping (v i = P i establishing this coespondance. The stuctue and colo of the digaph is given by (v i e =v j ( (v i! (v j. Each tansition in the pocesso booking ecipes is mapped to a unique edge in the gaph. We denote this coespondance by the one-toone mapping : E! T, with T denoting the set of tansitions in ecipe. Futhemoe, we define a wait-path between two pocessos, P i and P k, denoted by P i,! P k, if thee exists a set of pocessos such that P m n i! P j! l :::! P k. The same opeato (,! also defines the coesponding wait-path in the digaph, i.e., v i,! v k. The case whee each edge in a wait path has the same colo, say, we denote as a uni-coloed wait-path. Fo that we wite P i,! Pk with denoting the path s colo. Fo the deadlock analysis discussed late a numbe of special pattens in the PWRG ae of impotance. Definition 3. An elementay cycle L e is a sequence of distinct nodes hv v 2 ::: v n i and edges he e 2 ::: e n i with v i 2 V and e i 2 E such that thee exists an C fo each i = ::: n ; such that (v i e i =v i+, and (v n e n =v. An example of an elementay cycle is shown in Fig. 3(a. Accoding to Def. 3, each node only appeas once in the sequence and the colo of the connecting nodes is abitay. Anothe special case of an elementay coloed cycle is a so-called atomic counteflow. Definition 5. An atomic counteflow is an elementay coloed cycle of length two, i.e., consisting of two nodes. Atomic counteflows can be connected to fom counteflows as follows. Definition 6. A counteflow of the PWRG G C is a sequence of nodes hv v 2 ::: v n i, v i 2 V, such that (v! (v 2! :::! (vn and (v n! 2 (v n;! 2 :::! 2 (v with 2 C and 6=. Futhemoe, thee does not exist a node v i 2 V such that eithe (v i! (v and (v! 2 (v i, o (v i! 2 (v n and (v n! (v i. We then call v and v n the counteflow s tuning nodes. An example of a counteflow is given in Fig. 3(b. Note that each counteflow has two colos and that two edges of diffeent colo oiginate and teminate in each node except the tuning nodes. The tuning nodes have only one oiginating and one teminating edge. In the coesponding plant a counteflow coesponds to two batches going though the same sequence of pocessos but in opposite diections. (a V V 2 V 3 V n... (c V n (b Fig. 3. Examples of (a an elementay cycle, (b a counteflow, and (c a coloed counteflow stuctue. Counteflows can be combined to fom (coloed counteflow stuctues. Befoe we define these moe fomally we need to give a definition of tuning nodes fo counteflow stuctues. Definition 7. A tuning node v t in a counteflow stuctue is a node that is connected to one othe node v via exactly one in- and one out-ac of diffeent colos. i That is, thee exists one node v such that v t! v and v! j v t, i 6= j and no othe node is connected to v t. Definition 8. A (coloed counteflow stuctue is a set of counteflows that ae connected at tuning nodes epesenting mutual esouces such that the esulting gaph satisfies the following equiements:

5 A subset V ST of the counteflows tuning nodes ae also tuning nodes in the counteflow stuctue. We denote these as stuctue tuning nodes. (8v i 2 V ST : 9v k 2 V ST such that (v i,! (v k fo an abitay and i 6= k. Each coloed path oiginates and teminates in a stuctue tuning node, v t and v t2, espectively. Assume we extact all stuctue tuning nodes and connect each pai of nodes, say v ti and v tj, fo which thee exists a colo such that (v ti,! (v tj with a coloed ac of colo. Then, the esulting gaph has to be exactly one elementay coloed cycle. The second and thid condition guaantee that the numbe of colos in the counteflow stuctue is equal to jv ST j and a consequence of the last condition is that no two counteflows in the stuctue can have the same combination of colos. Figue 3(c shows an example of a counteflow stuctue. We point out that each node can belong to a numbe of pattens, while each atomic counteflow only can belong to one counteflow. Each counteflow, in tun, can be contained in an abitay numbe of counteflow stuctues. Also note, that nonatomic counteflows ae not special cases of elementay cycles. 4.3 Deadlock Avoidance when Booking Pocessos With these stuctues defined we can now move on to explain how these pattens coespond to deadlock situations and how to avoid deadlock. We assume hee that each ecipe is only executed once. This does, howeve, not diminish the geneality of ou esults since multiple batches of the same ecipe can be modeled by cloning the ecipe. The fist esult concens the ole of elementay coloed cycles fo deadlock analysis. The poof follows fom the definition of deadlock. Lemma 9. Each elementay colo cycle in a PWRG that is not pat of a counteflow defines a geneal mutual exclusion constaint, which, if not enfoced, can lead to deadlock. Note that a counteflow consists of a numbe of ECC of length two. Applying Lemma 9 to ECC that constitute a counteflow can lead to esticted deadlock, that is, the monitos themselves lock the system. Lemma 0. The GMEC defined by each elementay colo cycle of length n and with a set of edges E ECC = fe i g, is enfoced in a minimally estictive way by placing one monito place with n ; initial tokens. The monito has out-acs to the tansitions (e i and in-acs fom the tansitions (e i. PROOF. The only way to beak the cycle is to deny one of the ecipes access to the pocesso in the cycle. This is done by placing a monito with n ; tokens and out-acs to the booking events of the n pocessos in the cycle. That way, not all pocessos in the cycle can be booked at the same time and the cyclic wait is boken. As soon as any of the involved ecipes eleases its pocesso, a token is etuned to the monito. Any less estictive policy would allow all ecipes access to the coesponding pocessos in the cycle and would thus lead to deadlock. Hence, the policy is minimally estictive. 2 Figue 4 shows the pocesso booking models of thee ecipes, the coesponding PWRG, and the monito based on the elementay colo cycle. b( P 3 b( P3 Fig. 4. Pocesso booking model with monito and coesponding PWRG Fo the est of the pape we will now concentate on a sub-class of ecipes, whee each pocesso occus at most once in each ecipe. In industial applications it is not uncommon that a ecipe uses a pocesso only once. The above lemmas, howeve, apply even in the geneal case. Assumption. No pocesso occus moe than once in a ecipe. With this assumption in place we can fomulate some lemmas that link counteflows and counteflow stuctues to the deadlock poblem. Lemma. Each counteflow in the PWRG fomulates a GMEC fo the coesponding batch ecipes. Only one ecipe at a time can be allowed to have access to the pocessos in the counteflow. PROOF. Assume an abitay long counteflow with n nodes epesenting pocessos P though P n with P,! P n and P n,! P. We shall pove the lemma by contadiction. Assume that both ecipes gain access to the pocessos in the counteflow, i.e., has booked P and has gained access to P n.any continuation of ecipe execution will soone o late lead to making that coesponds to an elementay colo cycle consisting of two nodes, and thus deadlock the system. This poves the lemma. 2 Counteflows coespond to the case whee two ecipes un though the same sequence of pocessos but in opposite diections. As the lemma indicates, access to the whole sequence of pocessos has to be esticted as fomulated in the following coollay. The monito token is eleased at the ealiest possible time. Lemma 2. Assume a counteflow W containing a set of edges E W = fe i g and two tuning nodes v t v t2. Futhemoe, let e t t, e f t, et t2, and e f t2 denote the edges going to and fom v t and v t2, espectively. The GMEC defined by W is enfoced in a minimally

6 estictive way by placing a monito containing one token. The monito has out-acs to tansitions (e f t and (e f t2, and in-acs fom tansitions (et t and (e t t2. PROOF. Placement of the monito accoding to the lemma enfoces the GMEC and follows fom the poof of Lemma. A token can be etuned to the monito when the last pocesso in the path coesponding to a tuning node is booked, e.g., booking pocesso P n using the notation fom the poof of Lemma. Even though the monito no longe esticts the othe ecipe fom enteing the counteflow, so does the fact that P n cannot be booked by befoe it is eleased by. And with that has left the counteflow. 2 Unfotunately, we ae to date not able to fomulate the next two statements about the ole of counteflow stuctues fo deadlock although extensive simulation as lemmas since the fomal poof has not been completed yet. Conjectue 3. Each coloed counteflow stuctue in the PWRG fomulates a GMEC fo the coesponding batch ecipes. The numbe of ecipes that ae allowed access to the esouces of the counteflow stuctue is the numbe of tuning nodes minus one. Conjectue 4. Assume the counteflow stuctue WS containing a set of edges E WS = fe i g and a set of tuning nodes V T = fv ti g, i = ::: n. As befoe, let e t ti and ef denote the edges going to and fom ti v ti, espectively. The GMEC defined by WS is enfoced by placing a monito containing n ; tokens. The monito has out-acs to all tansitions (e f ti and inacs fom all tansitions (e t ti. Note that the monito fo the counteflow stuctue does not do away with the need to place a monitos fo each individual counteflow in the stuctue accoding to Lemma Example Figue 5(a shows excepts fom fou pocessobooking ecipes and pat of thei PWRG. Each ac in the PWRG is labeled with its coesponding colo. As can be seen, we can identify one elementay colo cycle, thee counteflows and one coloed counteflow stuctue. Note that we only conside deadlocks caused by bookings of the pocessos. Deadlocks oiginating fom bookings in the tanspoting system ae teated sepaately. Placing one monito fo each deadlock patten accoding to the above lemmas, esults in a deadlock-fee system as can easily be veified by compaing the eachability tees of both the oiginal and the deadlock-fee system. 5. CONCLUSION We have in this pape teated ecipes that only consist of one single batch steam. No join and split tansfes 4 v 3 v 2 b( P3 4 5 b( P3 b( P3 4 5 v v 2 5 v v 2 v v 4 v 4 v 2 Fig. 5. Fou pocesso-booking ecipes, the coesponding PWRG with (v i =P i and the identified deadlock stuctues. have been consideed. Though the extension of the gaph pattens to joins and splits seems to be athe staightfowad, this fact needs to be poved. So fa, thee diffeent pattens in the wait-elationship gaph have been identified to descibe potential deadlock situations. It emains to investigate if thee ae othe gaph stuctues that indicate deadlock in a system with the specifications teated in this pape. Anothe issue to conside is computational complexity of the deadlock solutions. Lewis et al. (998 have shown that monitos that solve deadlock situations elated to elementay colo cycles can be computed in polynomial time. Note, howeve, that the potential numbe of such deadlock situations is exponential in the numbe of esouces. Refeences K. Åkesson and M. Tittus. Modula contol fo avoiding deadlock in batch pocesses. In Poc of WBF 98, 998. L.E. Holloway, B.H. Kogh, and A. Giua. A suvey of Peti net methods fo contolled discete event systems. J. DEDS, 7(2:5 90, 997. F.L. Lewis, A. Guel, S. Bogdan, A. Doganalp, and O. Pastavanu. Analysis of deadlock and cicula waits using a matix model fo discete event manufactuing systems. Automatica, 34(9:083 00, 998. T. Muata. Peti nets: popeties, analysis and applications. Poc. of the IEEE, 77(4:54 580, 989. M. Tittus and K. Åkesson. Discete event models in batch contol. In Poc. 2nd MATHMOD, pages , Vienna, Austia, 997. M. Tittus and K. Åkesson. Peti net models in batch contol. To appea in Mathematical Modelling of Systems., 999. M. Tittus and B. Lennatson. Hieachical supevisoy contol fo batch pocesses. Technical Repot I- 998:2, Contol Eng. Lab., Chalmes Univ. of Technology, Götebog, Sweden, 998a. To be published in Tansactions on Contol Systems Technology. M. Tittus and B. Lennatson. Hieachical supevisoy contol fo batch pocesses. In Poc. ACC 98, Philadelphia, USA, 998b.

FACE VECTORS OF FLAG COMPLEXES

FACE VECTORS OF FLAG COMPLEXES FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Reachable State Spaces of Distributed Deadlock Avoidance Protocols

Reachable State Spaces of Distributed Deadlock Avoidance Protocols Reachable State Spaces of Distibuted Deadlock Avoidance Potocols CÉSAR SÁNCHEZ and HENNY B. SIPMA Stanfod Univesity We pesent a family of efficient distibuted deadlock avoidance algoithms with applications

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

Automatically Testing Interacting Software Components

Automatically Testing Interacting Software Components Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

Shortest Paths for a Two-Robot Rendez-Vous

Shortest Paths for a Two-Robot Rendez-Vous Shotest Paths fo a Two-Robot Rendez-Vous Eik L Wyntes Joseph S B Mitchell y Abstact In this pape, we conside an optimal motion planning poblem fo a pai of point obots in a plana envionment with polygonal

More information

ART GALLERIES WITH INTERIOR WALLS. March 1998

ART GALLERIES WITH INTERIOR WALLS. March 1998 ART GALLERIES WITH INTERIOR WALLS Andé Kündgen Mach 1998 Abstact. Conside an at galley fomed by a polygon on n vetices with m pais of vetices joined by inteio diagonals, the inteio walls. Each inteio wall

More information

Also available at ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010)

Also available at  ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) Also available at http://amc.imfm.si ISSN 1855-3966 (pinted edn.), ISSN 1855-3974 (electonic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) 109 120 Fulleene patches I Jack E. Gave Syacuse Univesity, Depatment

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Lecture 27: Voronoi Diagrams

Lecture 27: Voronoi Diagrams We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number.

(a, b) x y r. For this problem, is a point in the - coordinate plane and is a positive number. Illustative G-C Simila cicles Alignments to Content Standads: G-C.A. Task (a, b) x y Fo this poblem, is a point in the - coodinate plane and is a positive numbe. a. Using a tanslation and a dilation, show

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers

XFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio

More information

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces A Family of Distibuted Deadlock Avoidance Potocols and thei Reachable State Spaces Césa Sánchez, Henny B. Sipma, and Zoha Manna Compute Science Depatment Stanfod Univesity, Stanfod, CA 94305-9025 {cesa,sipma,manna}@cs.stanfod.edu

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Efficient Execution Path Exploration for Detecting Races in Concurrent Programs

Efficient Execution Path Exploration for Detecting Races in Concurrent Programs IAENG Intenational Jounal of Compute Science, 403, IJCS_40_3_02 Efficient Execution Path Exploation fo Detecting Races in Concuent Pogams Theodous E. Setiadi, Akihiko Ohsuga, and Mamou Maekaa Abstact Concuent

More information

Secure Collaboration in Mediator-Free Environments

Secure Collaboration in Mediator-Free Environments Secue Collaboation in Mediato-Fee Envionments Mohamed Shehab School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA shehab@pudueedu Elisa Betino Depatment of Compute Sciences

More information

COSC 6385 Computer Architecture. - Pipelining

COSC 6385 Computer Architecture. - Pipelining COSC 6385 Compute Achitectue - Pipelining Sping 2012 Some of the slides ae based on a lectue by David Culle, Pipelining Pipelining is an implementation technique wheeby multiple instuctions ae ovelapped

More information

Pipes, connections, channels and multiplexors

Pipes, connections, channels and multiplexors Pipes, connections, channels and multiplexos Fancisco J. Ballesteos ABSTRACT Channels in the style of CSP ae a poeful abstaction. The ae close to pipes and connections used to inteconnect system and netok

More information

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in

More information

Embeddings into Crossed Cubes

Embeddings into Crossed Cubes Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability

More information

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1 Impovement of Fist-ode Takagi-Sugeno Models Using Local Unifom B-splines Felipe Fenández, Julio Gutiéez, Gacián Tiviño and Juan Calos Cespo Dep. Tecnología Fotónica, Facultad de Infomática Univesidad Politécnica

More information

n If S is in convex position, then thee ae exactly k convex k-gons detemined by subsets of S. In geneal, howeve, S may detemine fa fewe convex k-gons.

n If S is in convex position, then thee ae exactly k convex k-gons detemined by subsets of S. In geneal, howeve, S may detemine fa fewe convex k-gons. Counting Convex Polygons in Plana Point Sets Joseph S. B. Mitchell a;1, Günte Rote b, Gopalakishnan Sundaam c, and Gehad Woeginge b a Applied Mathematics and Statistics, SUNY Stony Book, NY 11794-3600.

More information

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

MIS to Prepress ICS. Version Date: File: ICS-MIS-Prepress-1.01.doc,.pdf. Origination & Prepress WG

MIS to Prepress ICS. Version Date: File: ICS-MIS-Prepress-1.01.doc,.pdf. Origination & Prepress WG MIS to Pepess ICS Vesion 1.01 Date: 2006-01-02 File: ICS-MIS-Pepess-1.01.doc,.pdf Oigination & Pepess WG Abstact This ICS defines the Inteface between the MIS and Pepess. It specifies the Pocesses fo a

More information

Desired Attitude Angles Design Based on Optimization for Side Window Detection of Kinetic Interceptor *

Desired Attitude Angles Design Based on Optimization for Side Window Detection of Kinetic Interceptor * Poceedings of the 7 th Chinese Contol Confeence July 6-8, 008, Kunming,Yunnan, China Desied Attitude Angles Design Based on Optimization fo Side Window Detection of Kinetic Intecepto * Zhu Bo, Quan Quan,

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Automatic Generation of Reliable E Commerce Payment Processes

Automatic Generation of Reliable E Commerce Payment Processes Infomation Systems Engineeing (WISE 2000), Hong Kong, China, June 2000. Automatic Geneation of Reliable E Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Institute of Infomation Systems

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

Getting Started PMW-EX1/PMW-EX3. 1 Rotate the grip with the RELEASE button pressed. Overview. Connecting the Computer and PMW-EX1/EX3

Getting Started PMW-EX1/PMW-EX3. 1 Rotate the grip with the RELEASE button pressed. Overview. Connecting the Computer and PMW-EX1/EX3 A PMW-EX1/PMW-EX3 Getting Stated Oveview This document descibes how to use the XDCAM EX Vesion Up Tool (heeafte Vesion Up Tool ) to upgade the PMW-EX1 and PMW-EX3 to vesion 1.20 (PMW-EX1) o vesion 1.10

More information

View Synthesis using Depth Map for 3D Video

View Synthesis using Depth Map for 3D Video View Synthesis using Depth Map fo 3D Video Cheon Lee and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 1 Oyong-dong, Buk-gu, Gwangju, 500-712, Republic of Koea E-mail: {leecheon, hoyo}@gist.ac.k

More information

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer

Input Layer f = 2 f = 0 f = f = 3 1,16 1,1 1,2 1,3 2, ,2 3,3 3,16. f = 1. f = Output Layer Using the Gow-And-Pune Netwok to Solve Poblems of Lage Dimensionality B.J. Biedis and T.D. Gedeon School of Compute Science & Engineeing The Univesity of New South Wales Sydney NSW 2052 AUSTRALIA bbiedis@cse.unsw.edu.au

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

User Specified non-bonded potentials in gromacs

User Specified non-bonded potentials in gromacs Use Specified non-bonded potentials in gomacs Apil 8, 2010 1 Intoduction On fist appeaances gomacs, unlike MD codes like LAMMPS o DL POLY, appeas to have vey little flexibility with egads to the fom of

More information

TCBAC: An Access Control Model for Remote Calibration System

TCBAC: An Access Control Model for Remote Calibration System JOURNAL OF SOFTWARE, VOL. 8, NO., DECEMBER 03 339 TCBAC: An Access Contol Model fo Remote Calibation System Zhuokui Wu School of Mechanical & Automotive Engineeing, South China Univesity of Technology,

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

Image Enhancement in the Spatial Domain. Spatial Domain

Image Enhancement in the Spatial Domain. Spatial Domain 8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along

More information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma

MapReduce Optimizations and Algorithms 2015 Professor Sasu Tarkoma apreduce Optimizations and Algoithms 2015 Pofesso Sasu Takoma www.cs.helsinki.fi Optimizations Reduce tasks cannot stat befoe the whole map phase is complete Thus single slow machine can slow down the

More information

Evaluation of Partial Path Queries on XML Data

Evaluation of Partial Path Queries on XML Data Evaluation of Patial Path Queies on XML Data Stefanos Souldatos Dept of EE & CE NTUA, Geece stef@dblab.ntua.g Theodoe Dalamagas Dept of EE & CE NTUA, Geece dalamag@dblab.ntua.g Xiaoying Wu Dept. of CS

More information

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation

A Minutiae-based Fingerprint Matching Algorithm Using Phase Correlation A Minutiae-based Fingepint Matching Algoithm Using Phase Coelation Autho Chen, Weiping, Gao, Yongsheng Published 2007 Confeence Title Digital Image Computing: Techniques and Applications DOI https://doi.og/10.1109/dicta.2007.4426801

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

Hierarchical Region Mean-Based Image Segmentation

Hierarchical Region Mean-Based Image Segmentation Hieachical Region Mean-Based Image Segmentation Slawo Wesolkowski and Paul Fieguth Systems Design Engineeing Univesity of Wateloo Wateloo, Ontaio, Canada, N2L-3G1 s.wesolkowski@ieee.og, pfieguth@uwateloo.ca

More information

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology,

And Ph.D. Candidate of Computer Science, University of Putra Malaysia 2 Faculty of Computer Science and Information Technology, (IJCSIS) Intenational Jounal of Compute Science and Infomation Secuity, Efficient Candidacy Reduction Fo Fequent Patten Mining M.H Nadimi-Shahaki 1, Nowati Mustapha 2, Md Nasi B Sulaiman 2, Ali B Mamat

More information

Lecture 8 Introduction to Pipelines Adapated from slides by David Patterson

Lecture 8 Introduction to Pipelines Adapated from slides by David Patterson Lectue 8 Intoduction to Pipelines Adapated fom slides by David Patteson http://www-inst.eecs.bekeley.edu/~cs61c/ * 1 Review (1/3) Datapath is the hadwae that pefoms opeations necessay to execute pogams.

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

Prof. Feng Liu. Fall /17/2016

Prof. Feng Liu. Fall /17/2016 Pof. Feng Liu Fall 26 http://www.cs.pdx.edu/~fliu/couses/cs447/ /7/26 Last time Compositing NPR 3D Gaphics Toolkits Tansfomations 2 Today 3D Tansfomations The Viewing Pipeline Mid-tem: in class, Nov. 2

More information

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking Cyptanalysis of Hwang-Chang s a Time-Stamp Potocol fo Digital Watemaking *Jue-Sam Chou, Yalin Chen 2, Chung-Ju Chan 3 Depatment of Infomation Management, Nanhua Univesity Chiayi 622 Taiwan, R.O.C *: coesponding

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

Monitors. Lecture 6. A Typical Monitor State. wait(c) Signal and Continue. Signal and What Happens Next?

Monitors. Lecture 6. A Typical Monitor State. wait(c) Signal and Continue. Signal and What Happens Next? Monitos Lectue 6 Monitos Summay: Last time A combination of data abstaction and mutual exclusion Automatic mutex Pogammed conditional synchonisation Widely used in concuent pogamming languages and libaies

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

Voting-Based Grouping and Interpretation of Visual Motion

Voting-Based Grouping and Interpretation of Visual Motion Voting-Based Gouping and Intepetation of Visual Motion Micea Nicolescu Depatment of Compute Science Univesity of Nevada, Reno Reno, NV 89557 micea@cs.un.edu Géad Medioni Integated Media Systems Cente Univesity

More information

Topic -3 Image Enhancement

Topic -3 Image Enhancement Topic -3 Image Enhancement (Pat 1) DIP: Details Digital Image Pocessing Digital Image Chaacteistics Spatial Spectal Gay-level Histogam DFT DCT Pe-Pocessing Enhancement Restoation Point Pocessing Masking

More information

4.2. Co-terminal and Related Angles. Investigate

4.2. Co-terminal and Related Angles. Investigate .2 Co-teminal and Related Angles Tigonometic atios can be used to model quantities such as

More information

The Processor: Improving Performance Data Hazards

The Processor: Improving Performance Data Hazards The Pocesso: Impoving Pefomance Data Hazads Monday 12 Octobe 15 Many slides adapted fom: and Design, Patteson & Hennessy 5th Edition, 2014, MK and fom Pof. May Jane Iwin, PSU Summay Pevious Class Pipeline

More information

arxiv: v1 [cs.lo] 3 Dec 2018

arxiv: v1 [cs.lo] 3 Dec 2018 A high-level opeational semantics fo hadwae weak memoy models axiv:1812.00996v1 [cs.lo] 3 Dec 2018 Abstact Robet J. Colvin School of Electical Engineeing and Infomation Technology The Univesity of Queensland

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

Evaluation of Partial Path Queries on XML data

Evaluation of Partial Path Queries on XML data Evaluation of Patial Path Queies on XML data Stefanos Souldatos Dept of EE & CE, NTUA stef@dblab.ntua.g Theodoe Dalamagas Dept of EE & CE, NTUA dalamag@dblab.ntua.g Xiaoying Wu Dept. of CS, NJIT xw43@njit.edu

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

Parallel processing model for XML parsing

Parallel processing model for XML parsing Recent Reseaches in Communications, Signals and nfomation Technology Paallel pocessing model fo XML pasing ADRANA GEORGEVA Fac. Applied Mathematics and nfomatics Technical Univesity of Sofia, TU-Sofia

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

Quality Aware Privacy Protection for Location-based Services

Quality Aware Privacy Protection for Location-based Services In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,

More information

Reader & ReaderT Monad (11A) Young Won Lim 8/20/18

Reader & ReaderT Monad (11A) Young Won Lim 8/20/18 Copyight (c) 2016-2018 Young W. Lim. Pemission is ganted to copy, distibute and/o modify this document unde the tems of the GNU Fee Documentation License, Vesion 1.2 o any late vesion published by the

More information

A Mathematical Implementation of a Global Human Walking Model with Real-Time Kinematic Personification by Boulic, Thalmann and Thalmann.

A Mathematical Implementation of a Global Human Walking Model with Real-Time Kinematic Personification by Boulic, Thalmann and Thalmann. A Mathematical Implementation of a Global Human Walking Model with Real-Time Kinematic Pesonification by Boulic, Thalmann and Thalmann. Mashall Badley National Cente fo Physical Acoustics Univesity of

More information

Data mining based automated reverse engineering and defect discovery

Data mining based automated reverse engineering and defect discovery Data mining based automated evese engineeing and defect discovey James F. Smith III, ThanhVu H. Nguyen Naval Reseach Laboatoy, Code 5741, Washington, D.C., 20375-5000 ABSTRACT A data mining based pocedue

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM

A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,

More information

COEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines

COEN-4730 Computer Architecture Lecture 2 Review of Instruction Sets and Pipelines 1 COEN-4730 Compute Achitectue Lectue 2 Review of nstuction Sets and Pipelines Cistinel Ababei Dept. of Electical and Compute Engineeing Maquette Univesity Cedits: Slides adapted fom pesentations of Sudeep

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks

Number of Paths and Neighbours Effect on Multipath Routing in Mobile Ad Hoc Networks Numbe of Paths and Neighbous Effect on Multipath Routing in Mobile Ad Hoc Netwoks Oday Jeew School of Infomation Systems and Accounting Univesity of Canbea Canbea ACT 2617, Austalia oday.jeew@canbea.edu.au

More information