Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien
|
|
- Leslie Brown
- 5 years ago
- Views:
Transcription
1 Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, , Japan Abstract. In this stuy, we esign an implement a powerful Inuctive Logic Programming (ILP) system to conuct a parallel hypothesis search for inverse entailment. One of the most important parts of ILP is speeing up the hypothesis search, an a number of parallel hypothesis exploration methos have been propose. Recently, the Map-Reuce algorithm has been use for large-scale istribute computing, but it is ifficult to apply such clou technology to the ILP hypothesis search problem. By contrast, we esigne a metho that can ynamically istribute tasks for the hypothesis search, an implemente a network system in which moules autonomously cooperate with each other. We also conucte a parallel experiment on a large number of CPUs. Results confirm that the hypothesis search time is shortene accoring to the number of computers use, without reucing the optimality of the generate hypothesis. 1 INTRODUCTION Recently, various analytical approaches to a large amount of ata have been evelope. For example, the Map-Reuce moel consists of a large number of workers an one master, an uses on-line istribute-computing for quick analysis. However, Map-Reuce has limite efficiency for Inuctive Logic Programming (ILP) [2]. For example, searching for relationships in information is not efficient istribute processing in the Map-Reuce scheme, because new relationships are foun after searching for relationships in backgroun knowlege to generate rules. Therefore, the Map-Reuce application of ILP for large ata is not realistic because ILP requires much learning time. To solve this problem, various stuies have been conucte in an effort to spee up ILP [1, 3, 4]. Although the problems were partially solve, the process was not sufficiently spe up base on the number of processors provie, an the quality of the generate rules was not optimal, resulting in ifficulty in its use as a practical tool. Consiering these issues, we esigne an implemente a new parallel processing system for ILP. With this system, the worker itself has an autonomous function, unlike Map-Reuce. When a worker has no task (e.g., immeiately after start-up or immeiately after completion of a task), the worker accepts a 86
2 ^ E Fig. 1. System configuration of the ILP parallel computation system ivie task from another worker an starts the task. When the workloa (the number that the worker must search for relationships in information) reaches a fixe quantity, the worker requests other workers to process the ivie task. After the request for the first task issue by a master is implemente for one worker, autonomous process istribution is starte among workers, an all existing workers are engage (saturation of the task). Because the ivie task continues to be repeate among workers, all workers finally complete all processing at approximately the same time, an the master receives the processing result (generate rules). Our parallel processing system has the following features. 1: The master oes not nee to consier the ivision of the process in avance, as the master of the Map-Reuce scheme oes. 2: All workers work until the en (no free time). The first feature inicates that the propose system oes not require preivision processing of the master, which is use in conventional Map-Reuce. The secon feature means that speeup can be achieve. In our stuy, we implement the propose parallel ILP system an emonstrate its effectiveness by conucting parallel-learning experiments using rug iscovery ata. 2 SYSTEM DESIGN 2.1 System Configuration Figure 1 shows our ILP parallel-processing system consists of four moules. We esigne each moule as follows. Server moule for negotiation between moules The server moule meiates negotiation messages (e.g., request, accept, an commit) regaring the task share by workers. This moule broacasts to connecte workers an the master. This function is use uring negotiation to fin an acceptor of the ivie task. 87
3 Master Moule The master moule sens a task (main task) request to the worker moule (worker) an collects results (generate rules) from the worker moule when all ivie tasks of the worker moules are finishe. By connecting with the server moule, this moule can negotiate with worker moules an collect the negotiations between worker moules to recognize the processing situation of all worker moules. Worker Moule The worker moule manages an ILP moule an negotiates with other worker moules via the server moule. When this moule has no task, it accepts the share task from other worker moules, transfers the task ata to its own ILP moule, an starts learning. In aition, this moule sens a request message for the share task to other workers when the ILP moule nees to ivie the task. ILP Moule Basically, the ILP moule has the same functions as in traitional ILP. Receiving task ata from the worker moule, the ILP moule starts the learning process. It searches for generating rules; thus, the amount of search processing that this moule must perform increases. If the amount of search processing excees a threshol, this moule ivies the search processing an generates a ivie task. It then sens a request for the ivie task to the worker moule. In aition, when all search processing (its own learning process) is finishe an the requesting task exists (waiting for an accept response), this moule cancels the request of the task via the worker moule an starts the task itself. When all search processing is finishe an the requesting task no longer exists, this moule eclares the en of the task to the worker moules. As a result, this moule starts other ivie tasks from other worker moules. 2.2 Communication Protocol Between Moules In our system, a master moule communicates with worker moules an worker moules communicate with each other via the network (see Appenix Fig. 2,3). We prepare two communication protocols. One is the Negotiations Protocol between Moules to fin a worker moule that can execute a task (main task or ivie task). The other is the Task Content Transmission Protocol to sen task contents to a worker. The etails of each protocol are as follows. Protocol 1. Negotiations Protocol between Moules This protocol communicates via the server moule. All messages are broacast to all worker moules an a master moule. This protocol is use for negotiation messages (e.g., request, accept, an commit) to fin a worker moule that can execute a task. Protocol 2. Task Content Transmission Protocol After a worker moule is etermine by protocol 1, protocol 2 is use for transmitting the task contents to the moule. Communication between mo- 88
4 ules is carrie out by peer-to-peer communication (not via the server moule). As a result, all worker an ILP moules perform a task by repeately requesting share tasks (i.e., saturation of the ivie task). In the saturation state, all worker moules sen request messages regaring the share task to other worker moules an await an accept message. Conversely, each worker moule is reay to receive a request task from all other worker moules. Thus, a worker moule that has finishe its own task sens an accept message to another worker moule an receives a new share task (see Appenix Fig. 4,5). Share tasks are requeste an receive until a learning rule is generate. As a result, worker an ILP moules operate without spare time. 3 IMPLEMENTATION AND EXPERIMENT In the present stuy, we implemente a rule generation engine for ILP [2] an each moule escribe above using the Java programming language. In aition, in this implementation experiment, we temporarily set the threshol (number of searches to be conucte) at 200 for the ivision request in the ILP moule. We use two 6-CPU computers an two 4-CPU computers in our parallel processing experiment. 3.1 Speeup Experiment We use two 6CPU computers to conuct an experiment to measure speeup an use mile-scale ata on rug iscovery analysis as training ata. One by one, we increase the number of CPUs from 1 to 12, an performe 12 experiments. In our system, a worker moule (an an ILP moule) use one CPU. The experiment results are presente in Table 1. We obtaine a speeup of 7.4 using a 12-CPU unit for this exercise. However, this problem was smallscale an i not provie enough speeup. 3.2 Large-Scale Parallel Experiment Using four computers, we performe application experiments on a large-scale example of a rug iscovery problem. In this experiment, we use 1 CPU, 12 CPUs (two 6-CPU computers), an 20 CPUs (two 6-CPU computers + two 4- CPU computers) in a total of three experiments. Table 2 shows the experiment results. The results are confirme that speeup correspone to the number of CPUs use. For this rug-iscovery problem, it conventionally took at least 15h using a parallel-processing system; however, with our propose metho, one learning process require less than 1h. Thus, experiments can be easily reconucte by ajusting the parameters an can achieve better research results. 89
5 Table 1. Parallel experiments using 12 CPUs (two 6CPU computers) The Number of CPU Processing time(sec.) Speeup Table 2. Parallel experiments using 20 CPUs (two 6-CPU computers an two 4-CPU computers) The Number of CPU Processing time(sec.) Speeup DISCUSSION For the above parallel processing experiments, we measure the communication time an processing steps between workers to investigate how the workers (worker moule an ILP moule) epen on each CPU. For this measurement, we use six workers an one 6-CPU computer. In this reconucte experiment, we implemente measuring functions on each moule. Thus, the processing time is longer than in the experiment results using 6 CPUs. Table 1 shows the results. We measure the time require for learning an for receiving the task ata of each worker. Table 3 lists the processing time of each worker. The en time for all tasks is sec. Table 3. Learning time an receiving time of each worker in the parallel-processing experiment using six workers (6 CPUs) (in sec.) Worker ID Average Learning time Receiving time Total operation time
6 Table 4. Learning time an receiving time of each worker in the parallel-processing experiment using six workers (6 CPUs) (%) Worker ID Average Learning time Receiving time Total operation time Table 3 inicates the processing time of each worker. We confirme that each worker spent an average of 94% of the time on learning an 3% on receiving from other workers (see Appenix Fig. 6). In aition, learning cannot start until receiving is complete; however, sening to other workers is performe concurrently with learning. In a previous stuy [3], much time was necessary for sening an receiving between workers. In the present stuy, we successfully shortene the time require for sening an receiving, because the implementation of the propose system use the object communication function an serialize function of Java API. 5 CONCLUSIONS In the present stuy, we esigne an implemente a parallel system of Inuctive Logic Programming (ILP) to realize a parallel hypothesis search for inverse entailment. The hypothesis generation of ILP requires search processing, an the result of the hypothesis generation influences the next hypothesis generation. Thus, ILP cannot be parallelize using the Map-Reuce metho that was evelope base on clou technology. To aress these issues, we esigne a metho that can ynamically istribute tasks for search processing, an implemente a network system in which moules autonomously cooperate with each other. In aition, we enable parallel experimentation using a large number of workers (CPUs). Results confirme that we shortene the processing time epening on the number of computers use, without reucing the quality of the rule generate. References 1. Anreas Fijelan, Wayne Luk an Stephen Muggleton: Customisable Multi- Processor Acceleration of Inuctive Logic Programming, Latest Avances in Inuctive Logic Programming, pp , Fumio Mizoguchi an Hayato Ohwaa: Constraine Relative Least General Generalization for Inucing Constraint Logic Programs, New Generation Computing 13, pp , Hayato Ohwaa, Hiroyuki Nishiyama an Fumio Mizoguchi: Concurrent Execution of Optimal Hypothesis Search for Inverse Entailment, Inuctive Logic Programming, Lecture Notes in Computer Science Vol. 1866, pp , Ashwin Srinivasan: Parallel ILP for istribute-memory architectures, Machine Learning, Vol. 74, Issue 3, pp ,
7 Appenix A: Image of communication protocol Figures 2,3,4,5 show flow of communication protocol with moules. ^ Z E Fig. 2. Flow of communication from a master moule to worker moules to fin a worker that commits to a task using the Negotiations Protocol between Moules. The master moule sens the request message of the task to all worker moules. If there is no learning task, the worker moule that receives the request message sens an accept message to the source of the request (master moule). The master moule that receives the accept messages chooses one worker moule an sens a commit message to that worker moule. D ^ ^ E Fig. 3. Flow of communication to transmit task ata to a worker moule using the Task Content Transmission Protocol. 92
8 > Z ^ E Fig. 4. Flow of communication to fin a worker that commits a task between worker moules using the Negotiations Protocol between Moules. ^ ^ E Fig. 5. Flow of communication to transmit task ata between worker moules using the Task Content Transmission Protocol. 93
9 Appenix B: Operational status of each worker t t t t t te / e e e e Fig. 6. Operational status of each worker in the parallel-processing experiments using six workers (6CPUs). The vertical axis represents time, an the horizontal axis represents the operational status of each worker. Task ID refers to the number of main tasks requeste by the master moule. In this learning experiment, the master moule sent 15 requests for the task. 94
Study of Network Optimization Method Based on ACL
Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department
More informationCoupling the User Interfaces of a Multiuser Program
Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces
More informationImage Segmentation using K-means clustering and Thresholding
Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,
More informationQueueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks
Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication
More informationSkyline Community Search in Multi-valued Networks
Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h
More informationAdvanced method of NC programming for 5-axis machining
Available online at www.scienceirect.com Proceia CIRP (0 ) 0 07 5 th CIRP Conference on High Performance Cutting 0 Avance metho of NC programming for 5-axis machining Sergej N. Grigoriev a, A.A. Kutin
More informationAn Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources
An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract
More informationSoftware Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency
Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science
More informationI DT MC. Operating Manual SINAMICS S120. Verification of Performance Level e in accordance with EN ISO
I DT MC Operating Manual SINAMICS S20 Verification of Performance Level e in accorance with EN ISO 3849- Document Project Status: release Organization: I DT MC Baseline:.2 Location: Erl. F80 Date: 24.09.2009
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science
More informationComparison of Methods for Increasing the Performance of a DUA Computation
Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,
More informationTowards a Low-Power Accelerator of Many FPGAs for Stencil Computations
2012 Thir International Conference on Networking an Computing Towars a Low-Power Accelerator of Many FPGAs for Stencil Computations Ryohei Kobayashi Tokyo Institute of Technology, Japan E-mail: kobayashi@arch.cs.titech.ac.jp
More informationFast Fractal Image Compression using PSO Based Optimization Techniques
Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting
More informationAPPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly
International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -
More informationIntensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2
This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar
More informationDivide-and-Conquer Algorithms
Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:
More informationMORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks
: a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications
More informationResearch Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks
Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time
More informationTransient analysis of wave propagation in 3D soil by using the scaled boundary finite element method
Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite
More informationProvisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks
Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:
More informationNAND flash memory is widely used as a storage
1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage
More informationInuence of Cross-Interferences on Blocked Loops: to know the precise gain brought by blocking. It is even dicult to determine for which problem
Inuence of Cross-Interferences on Blocke Loops A Case Stuy with Matrix-Vector Multiply CHRISTINE FRICKER INRIA, France an OLIVIER TEMAM an WILLIAM JALBY University of Versailles, France State-of-the art
More informationImproving Spatial Reuse of IEEE Based Ad Hoc Networks
mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos
More informationFormation Control of Small Unmanned Aerial Vehicles Using Virtual Leader and Point-to-Multipoint Communication
Trans. Japan Soc. Aero. Space Sci. Vol. 5, No., pp. 3 9, Formation Control of Small Unmanne Aerial Vehicles Using Virtual Leaer an Point-to-Multipoint Communication y Takuma HINO an Takeshi TSUCHIYA Department
More informationLakshmish Ramanna University of Texas at Dallas Dept. of Electrical Engineering Richardson, TX
Boy Sensor Networks to Evaluate Staning Balance: Interpreting Muscular Activities Base on Inertial Sensors Rohith Ramachanran Richarson, TX 75083 rxr057100@utallas.eu Gaurav Prahan Dept. of Computer Science
More informationA Plane Tracker for AEC-automation Applications
A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)
More informationMODULE VII. Emerging Technologies
MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Software Define Networking The Internet Of Things Other trens in networking
More informationPAPER. 1. Introduction
IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,
More informationAdjusted Probabilistic Packet Marking for IP Traceback
Ajuste Probabilistic Packet Marking for IP Traceback Tao Peng, Christopher Leckie, an Kotagiri Ramamohanarao 2 ARC Special Research Center for Ultra-Broaban Information Networks Department of Electrical
More informationLocal Path Planning with Proximity Sensing for Robot Arm Manipulators. 1. Introduction
Local Path Planning with Proximity Sensing for Robot Arm Manipulators Ewar Cheung an Vlaimir Lumelsky Yale University, Center for Systems Science Department of Electrical Engineering New Haven, Connecticut
More informationOffloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization
1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24
More informationAdaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots
Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:
More informationOn the Placement of Internet Taps in Wireless Neighborhood Networks
1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that
More informationNon-homogeneous Generalization in Privacy Preserving Data Publishing
Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h
More informationComputer Organization
Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.
More informationReconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity
Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Base on Complexity Xiangao Huang 1 Wei Huang 2 Xiaozhou Liu 3 Chao Wang 4 Zhu jing Wang 5 Tao Wang 1 1 College of Engineering, Shantou
More informationImpact of FTP Application file size and TCP Variants on MANET Protocols Performance
International Journal of Moern Communication Technologies & Research (IJMCTR) Impact of FTP Application file size an TCP Variants on MANET Protocols Performance Abelmuti Ahme Abbasher Ali, Dr.Amin Babkir
More informationChapter 9 Memory Management
Contents 1. Introuction 2. Computer-System Structures 3. Operating-System Structures 4. Processes 5. Threas 6. CPU Scheuling 7. Process Synchronization 8. Dealocks 9. Memory Management 10.Virtual Memory
More informationMessage Transport With The User Datagram Protocol
Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer
More informationShift-map Image Registration
Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.
More informationScalable Deterministic Scheduling for WDM Slot Switching Xhaul with Zero-Jitter
FDL sel. VOA SOA 100 Regular papers ONDM 2018 Scalable Deterministic Scheuling for WDM Slot Switching Xhaul with Zero-Jitter Bogan Uscumlic 1, Dominique Chiaroni 1, Brice Leclerc 1, Thierry Zami 2, Annie
More informationWilliam S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract
Optimization Methos for Calculating Design Imprecision y William S. Law Eri K. Antonsson Engineering Design Research Laboratory Division of Engineering an Applie Science California Institute of Technology
More informationBends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways
Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis
More informationFeature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory
Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative
More informationParticle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base
More informationRough Set Approach for Classification of Breast Cancer Mammogram Images
Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems
More informationOn the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems
On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,
More informationEFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER
FFICINT ON-LIN TSTING MTHOD FOR A FLOATING-POINT ADDR A. Droz, M. Lobachev Department of Computer Systems, Oessa State Polytechnic University, Oessa, Ukraine Droz@ukr.net, Lobachev@ukr.net Abstract In
More informationNon-Uniform Sensor Deployment in Mobile Wireless Sensor Networks
01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University
More informationNEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2.
JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 13/009, ISSN 164-6037 Krzysztof WRÓBEL, Rafał DOROZ * fingerprint, reference point, IPAN99 NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES
More informationOn Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation
On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member
More informationModifying ROC Curves to Incorporate Predicted Probabilities
Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,
More informationParallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm
NASA/CR-1998-208733 ICASE Report No. 98-45 Parallel Directionally Split Solver Base on Reformulation of Pipeline Thomas Algorithm A. Povitsky ICASE, Hampton, Virginia Institute for Computer Applications
More informationFrom an Abstract Object-Oriented Model to a Ready-to-Use Embedded System Controller
From an Abstract Object-Oriente Moel to a Reay-to-Use Embee System Controller Stanislav Chachkov, Diier Buchs Software Engineering Laboratory, Swiss Feeral Institute for Technology 1015 Lausanne, Switzerlan
More informationTable-based division by small integer constants
Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr
More informationAlmost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control
Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract
More informationA Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition
ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural
More informationACE: And/Or-parallel Copying-based Execution of Logic Programs
ACE: An/Or-parallel Copying-base Execution of Logic Programs Gopal GuptaJ Manuel Hermenegilo* Enrico PontelliJ an Vítor Santos Costa' Abstract In this paper we present a novel execution moel for parallel
More informationRandom Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation
DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,
More informationRobust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks
Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,
More informationLearning Subproblem Complexities in Distributed Branch and Bound
Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University
More informationProbabilistic Medium Access Control for. Full-Duplex Networks with Half-Duplex Clients
Probabilistic Meium Access Control for 1 Full-Duplex Networks with Half-Duplex Clients arxiv:1608.08729v1 [cs.ni] 31 Aug 2016 Shih-Ying Chen, Ting-Feng Huang, Kate Ching-Ju Lin, Member, IEEE, Y.-W. Peter
More information5th International Conference on Advanced Design and Manufacturing Engineering (ICADME 2015)
5th International Conference on Avance Design an Manufacturing Engineering (ICADME 25) Research on motion characteristics an application of multi egree of freeom mechanism base on R-W metho Xiao-guang
More informationIndexing the Edges A simple and yet efficient approach to high-dimensional indexing
Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science
More informationOnline Appendix to: Generalizing Database Forensics
Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that
More informationArchitecture Design of Mobile Access Coordinated Wireless Sensor Networks
Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,
More informationCluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters
Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets
More informationA Modified Immune Network Optimization Algorithm
IAENG International Journal of Computer Science, 4:4, IJCS_4_4_3 A Moifie Immune Network Optimization Algorithm Lu Hong, Joarer Kamruzzaman Abstract This stuy proposes a moifie artificial immune network
More informationFrequency Domain Parameter Estimation of a Synchronous Generator Using Bi-objective Genetic Algorithms
Proceeings of the 7th WSEAS International Conference on Simulation, Moelling an Optimization, Beijing, China, September 15-17, 2007 429 Frequenc Domain Parameter Estimation of a Snchronous Generator Using
More informationVideo-based Characters Creating New Human Performances from a Multi-view Video Database
Vieo-base Characters Creating New Human Performances from a Multi-view Vieo Database Feng Xu Yebin Liu? Carsten Stoll? James Tompkin Gaurav Bharaj? Qionghai Dai Hans-Peter Seiel? Jan Kautz Christian Theobalt?
More informationSocially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach
Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly
More informationOpen Access Adaptive Image Enhancement Algorithm with Complex Background
Sen Orers for Reprints to reprints@benthamscience.ae 594 The Open Cybernetics & Systemics Journal, 205, 9, 594-600 Open Access Aaptive Image Enhancement Algorithm with Complex Bacgroun Zhang Pai * epartment
More informationKinematic Analysis of a Family of 3R Manipulators
Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,
More informationA Classification of 3R Orthogonal Manipulators by the Topology of their Workspace
A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.
More informationOptimal Routing and Scheduling for Deterministic Delay Tolerant Networks
Optimal Routing an Scheuling for Deterministic Delay Tolerant Networks Davi Hay Dipartimento i Elettronica olitecnico i Torino, Italy Email: hay@tlc.polito.it aolo Giaccone Dipartimento i Elettronica olitecnico
More informationWireless Sensing and Structural Control Strategies
Wireless Sensing an Structural Control Strategies Kincho H. Law 1, Anrew Swartz 2, Jerome P. Lynch 3, Yang Wang 4 1 Dept. of Civil an Env. Engineering, Stanfor University, Stanfor, CA 94305, USA 2 Dept.
More informationNET Institute*
NET Institute* www.netinst.org Working Paper #08-24 October 2008 Computer Virus Propagation in a Network Organization: The Interplay between Social an Technological Networks Hsing Kenny Cheng an Hong Guo
More informationfiltering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember
107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,
More informationThe Journal of Systems and Software
The Journal of Systems an Software 83 (010) 1864 187 Contents lists available at ScienceDirect The Journal of Systems an Software journal homepage: www.elsevier.com/locate/jss Embeing capacity raising
More informationRegularized Laplacian Zero Crossings as Optimal Edge Integrators
Regularize aplacian Zero rossings as Optimal Ege Integrators R. KIMME A.M. BRUKSTEIN Department of omputer Science Technion Israel Institute of Technology Technion ity, Haifa 32, Israel Abstract We view
More informationHOW DO SECURITY TECHNOLOGIES INTERACT WITH EACH OTHER TO CREATE VALUE? THE ANALYSIS OF FIREWALL AND INTRUSION DETECTION SYSTEM
HOW O SECURTY TECHNOLOGES NTERACT WTH EACH OTHER TO CREATE VALUE? THE ANALYSS O REWALL AN NTRUSON ETECTON SYSTEM Huseyin CAVUSOGLU Srinivasan RAGHUNATHAN Hasan CAVUSOGLU Tulane University University of
More informationComparison of Wireless Network Simulators with Multihop Wireless Network Testbed in Corridor Environment
Comparison of Wireless Network Simulators with Multihop Wireless Network Testbe in Corrior Environment Rabiullah Khattak, Anna Chaltseva, Laurynas Riliskis, Ulf Boin, an Evgeny Osipov Department of Computer
More informationOptimal Link Capacity Dimensioning in Proportionally Fair Networks
Optimal Link Capacity Dimensioning in Proportionally Fair Networks Micha l Pióro 1,Gábor Malicskó 2, an Gábor Foor 3 1 Department of Communication Systems, Lun Institute of Technology, Sween, Michal.Pioro@telecom.lth.se
More informationAn Infrastructureless End-to-End High Performance Mobility Protocol
Proceeings of the 5 IEEE International Conference on Electro Information Technology, 5, Lincoln Nebraska, May 5 An Infrastructureless En-to-En High Performance Mobility Protocol Saneep Davu, Rai Y. Zaghal
More informationJust-In-Time Software Pipelining
Just-In-Time Software Pipelining Hongbo Rong Hyunchul Park Youfeng Wu Cheng Wang Programming Systems Lab Intel Labs, Santa Clara What is software pipelining? A loop optimization exposing instruction-level
More informationResearch Article Research on Law s Mask Texture Analysis System Reliability
Research Journal of Applie Sciences, Engineering an Technology 7(19): 4002-4007, 2014 DOI:10.19026/rjaset.7.761 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitte: November
More informationImplementation and Evaluation of NAS Parallel CG Benchmark on GPU Cluster with Proprietary Interconnect TCA
Implementation an Evaluation of AS Parallel CG Benchmark on GPU Cluster with Proprietary Interconnect TCA Kazuya Matsumoto 1, orihisa Fujita 2, Toshihiro Hanawa 3, an Taisuke Boku 1,2 1 Center for Computational
More informationDistributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs
IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,
More informationDual Arm Robot Research Report
Dual Arm Robot Research Report Analytical Inverse Kinematics Solution for Moularize Dual-Arm Robot With offset at shouler an wrist Motivation an Abstract Generally, an inustrial manipulator such as PUMA
More informationWaleed K. Al-Assadi. Anura P. Jayasumana. Yashwant K. Malaiya y. February Colorado State University
Dierential I DDQ Testable Static RAM Architecture Walee K. Al-Assai Anura P. Jayasumana Yashwant K. Malaiya y Technical Report CS-96-102 February 1996 Department of Electrical Engineering/ y Department
More informationTCP Symbiosis: Congestion Control Mechanisms of TCP based on Lotka-Volterra Competition Model
TCP Symbiosis: Congestion Control Mechanisms of TCP base on Lotka-Volterra Competition Moel Go Hasegawa Cybermeia Center Osaka University 1-3, Machikaneyama-cho, Toyonaka, Osaka 56-43, JAPAN Email: hasegawa@cmc.osaka-u.ac.jp
More informationDisjoint Multipath Routing in Dual Homing Networks using Colored Trees
Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,
More informationTop-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications
Top-own Connectivity Policy Framework for Mobile Peer-to-Peer Applications Otso Kassinen Mika Ylianttila Junzhao Sun Jussi Ala-Kurikka MeiaTeam Department of Electrical an Information Engineering University
More informationNavigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar
Navigation Aroun an nknown Obstacle for Autonomous Surface Vehicles sing a Forwar-Facing Sonar Patrick A. Plonski, Joshua Vaner Hook, Cheng Peng, Narges Noori, Volkan Isler Abstract A robotic boat is moving
More informationNon-Uniform Sensor Deployment in Mobile Wireless Sensor Networks
0 0 0 0 0 0 0 0 on-uniform Sensor Deployment in Mobile Wireless Sensor etworks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,
More informationAnalysis of Virtual Machine System Policies
Analysis of Virtual Machine System Policies Sanra Ruea, Hayawarh Vijayakumar, Trent Jaeger Systems an Internet Infrastructure Security Laboratory The Pennsylvania State University University Park, PA,
More informationGeneralized Edge Coloring for Channel Assignment in Wireless Networks
TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html
More informationTechnical Report TR Navigation Around an Unknown Obstacle for Autonomous Surface Vehicles Using a Forward-Facing Sonar
Technical Report Department of Computer Science an Engineering niversity of Minnesota 4-192 Keller Hall 2 nion Street SE Minneapolis, MN 55455-159 SA TR 15-5 Navigation Aroun an nknown Obstacle for Autonomous
More informationEstimating Velocity Fields on a Freeway from Low Resolution Video
Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department
More informationA New Search Algorithm for Solving Symmetric Traveling Salesman Problem Based on Gravity
Worl Applie Sciences Journal 16 (10): 1387-1392, 2012 ISSN 1818-4952 IDOSI Publications, 2012 A New Search Algorithm for Solving Symmetric Traveling Salesman Problem Base on Gravity Aliasghar Rahmani Hosseinabai,
More information