Networks Based on Tree Semantics Approach
|
|
- Augustus Franklin Sharp
- 6 years ago
- Views:
Transcription
1 Word Journa of Socia Science Research ISSN (Print) ISSN (Onine) Vo. 4, No. 4, Reachabiity Anaysis of Asynchronous Dynamic Pushdown Networks Based on Tree Semantics Approach Guodong Wu 1* & Junyan Qian 2 1 Schoo of Information and Computer, Anhui Agricutura University, Hefei, China 2 Guangxi Key Laboratory of Trusted Software, Guiin University of Eectronic Technoogy, Guiin , China * Guodong Wu, E-mai: @qq.com Received: October 6, 2017 Accepted: October 15, 2017 Onine Pubished: October 17, 2017 doi: /wjssr.v4n4p287 URL: Abstract ADPN (Asynchronous Dynamic Pushdown Networks) are an abstract mode for concurrent programs with recursive procedures and dynamic thread creation. Usuay, asynchronous dynamic pushdown networks are described with intereaving semantics, in which the backward anaysis is not effective. In order to improve intereaving semantics, tree semantics approach was introduced. This paper extends the tree semantics to ADPN. Because the reachabiity probem of ADPN is aso undecidabe, we address the context-bounded reachabiity probem and provide an agorithm for backward reachabiity anaysis with tree-based semantics Approach. Keywords DPN, ADPN, tree semantics, context-bounded, backward reachabiity 1. Introduction With deveopment of muti-core processor, the research on concurrent program has become the focus of programming. Usuay, the concurrent program empoys concurrent pushdown system or parae procedure ca for modeing, which two modes, however, fai to we simuate program with dynamic thread creation. Bouajjani et a. suggested in 2005 the DPN which are appicabe to modeing of concurrent program containing recursive procedures or dynamic thread creation, yet its execution semantics is intereaving semantics, in which the backward reachabiity anaysis is inefficient. Lammich et a. suggested tree semantics for DPN to mode execution of program as a tree, which more conforms to actua running of program, and they provided the reachabiity anaysis means for dynamic pushdown networks under tree semantics yet without considering intercommunication of threads. Based on dynamic pushdown networks mode, Bouajjani raised ADPN mode, whose reachabiity probem, however, is undecidabe and backward reachabiity on it is compicated. Faouzi modeed program 287
2 Word Journa of Socia Science Research Vo. 4, No. 4, 2017 containing dynamic thread creation, presented context-bounded anaysis agorithm for this mode, and proved it is decidabe. Wenner extended dynamic pushdown networks to weighted dynamic pushdown networks to enhance modeing capacity of mode. The paper extends tree semantic anaysis into ADPN mode to make it more efficienty conduct backward reachabiity anaysis, and soved undecidabe * probem using the context-bounded approach. The backward reachabe patterns set Pr e M of this mode keeps reguarity property under tree semantics, i.e., abe to construct automator to receive a group of * backward reachabe patterns set Pr e M. The paper structures an intermediate mode to simuate execution mode of tree semantics, cacuates backward reachabe patterns set of this intermediate mode in context of finite times, and uses projection operation to derive the backward reachabe patterns set on origina mode. Finay, the compexity anaysis on this agorithm is presented. 2. Reate Knowedge ADPN is extension of DPN to simuate pushdown, new process and asynchronous communication of inter-thread using of shared memory. ADPN is a quintupe M = (G, P, Γ,, g ), where G is goba state set, P is oca state set, Γ is stack symbo, is set of oca migration rues: (a) ργ ρ 1 w 1 ; (b) ργ ρ 1 w 1 ρ 2 w 2, where ρ, ρ 1, ρ 2 P, γ Γ, w 1, w 2 Γ ; g is set of goba migration rues: (a) (g, ργ) (g, ρ 1 w 1 ); (b) (g, ργ) (g, ρ 1 w 1 ) ρ 2 w 2 ; where g, g G, ρ, ρ 1, ρ 2 P, γ Γ, w 1, w 2 Γ*. ADPN s pattern is (g, α) G (P Γ*), where g is goba state, character string α = ρ 1 w 1 ρ 2 w 2 ρ n w n, and each substring represents corresponding DPN pattern of ADPN pattern. Let C represent ADPN pattern set, migration reation is defined as: (g, ս) (g, v) is true, then ργ p1 w 1 beongs to rues set, and ս = ս 1 ρ γ ս 2, v = ս 1 ρ 1 w 1 ս 2, g = g, or ργ p1 w 1 ρ 2 w 2 beongs to rues set, or (g, ργ) (g, ρ1 w 1 ) beongs to rues set g, and ս = ս 1 ρ γ ս 2, v = ս 1 ρ 1 w 1 ս 2, or (g, ργ) (g, ρ1 w 1 ) ρ 2 w 2, and ս = ս 1 ργս 2, v = ս 1 ρ 2 w 2 ρ 1 w 1 ս 2 ; Where ս 1 (PΓ )*, ս 2 Γ (PΓ )*. Goba migration and oca migration rues sets constitute the whoe migration system. State is reachabe: There is ADPN M and patterns set S C, define post M *(S) and pre M *(S) as respectivey representing forward and backward reachabe patterns sets that start from pattern S. The forward and backward reachabiity probems can respectivey be defined as: patterns set I and F are respectivey initia and a certain given pattern sets. To judge whether the state in given pattern F is reachabe just Pubished by SCHOLINK INC. 288
3 Word Journa of Socia Science Research Vo. 4, No. 4, 2017 needs to judge whether post M *(I) F = φ or pre M *(F) I = φ is true. However, these two reachabiity probems are both undecidabe. K-context-bounded state is reachabe: Qadeer et a. Put forward context-bounded reachabiity anaysis. The cacuation is switched from one thread to another thread, which is defined as context switching. K-boundary means the corresponding migration sequence at most contains K contexts. K-context-bounded state being reachabe just means the set of state reachabe by ADPN in K contexts. post k,m *(S) and pre k,m *(S) are respectivey defined as set of forward and backward reachabe patterns that start from S and reachabe to K-context-boundary. The K-context-bounded state reachabiity probem is decidabe. Musuvathi et a. proved that majority of states can be detected as ong as K is set as a sma constant. 3. Tree Semantics of ADPN This section extends tree semantics to ADPN, and migration sequence is partia order, which is simiar to a tree, as shown in Figure 1. The initia state of the migration sequence ony contains a thread, and new threads are created dynamicay. The migration sequence of newy created threads correspond to execution tree on the eft of node S, and the migration sequence on the right of node S is origina thread. The form is defined as T M : = N L T M /S L T M T M /L < G,PΓ* >, where Nt corresponds to non-dynamic creation rue, and what foows it is t; S t s t corresponds to dynamic creation rue, and what foows it is a dynamicay created new thread node t s and origina thread s node t; L <g, pw> corresponds to the pattern when thread running terminates. The advantage of tree semantics is immediatey judging which progress the migration beongs to via execution mode of tree form. N 1 S 2 spawn N 4 N 3 L <g,pw> L <g,pw Figure 1. ADPN Execution Tree Definition 1 (Execution tree): The execution tree is defined as migration sequence of mode under tree semantics. Migration rue M <g, PΓ*> T M <g, Conf N > means the initia state ony contains execution tree of singe thread, where Conf N is pattern α of corresponding DPN. When the initia state Pubished by SCHOLINK INC. 289
4 Word Journa of Socia Science Research Vo. 4, No. 4, 2017 contains mutipe threads, definition h c M c means migration from pattern c to pattern c via execution tree h, where h = t 1 t n. The execution tree is reguar. The paper adopts hedge-automator for receiving. Hedge-automator T = (S, A 0, D), where S is set of a group of finite states, A 0 is an initia automator meeting L(A 0 ) S*. Rues set D = D L D N D S : The rue s A 1 D L simuates eaf node, rue s s DN simuates non-dynamicay created node, where, s, s, s s S, L, automator A 1 receives a patterns sets (L(A 1 ) (G, (PΓ*) + )). Execution tree h = t 1 t n T M * can be received by hedge-automator when and ony when execution tree t 1 t n can be simuated by rues set D and initia states set of execution tree respectivey correspond to initia states set s 1 s n L(A 0 ) of automator. Rue ab T S T M represents the association between hedge-automator and execution tree, as shown beow in form: [Leaf node] ab T (s, L <g, pw>) s A 1 D L <g, pw> L(A 1 ) [Non-dynamic creation] ab T (s,n t) s s D ab ( s,) t N T [Dynamic creation] ab T (s, S t s t) s s s D ab ( s,) t ab ( s, t ) s S T T s s Where ab T (s, t) means the state of execution tree t corresponds to state s of automator. It is assumed that ab T (s 1 s n,t 1 t n ) ab T (s 1,t 1 ) ab T (s n,t n ), then the anguage received by hedge-automator T is L( T ) : = { h s L( A ). ab ( s, h)} 0 T. 4. Backward Reachabe Agorithm Based on Tree Semantics It is assumed that pattern of ADPN is <g, α>, where α is corresponding DPN pattern. Receiving pattern α of automator A is structured according to iterature. The paper wi structure automator Z receiving ADPN pattern <g, α>. For any character string u 1 pu 2 L(A), automator Z receives character string w = u 1 (g,p)u 2, where u 1 (PΓ*)*, p P, u 2 Γ*(PΓ*)*. Theorem 1: ADPN M is given, and automator Z receives character string w = u 1 (g, p)u 2, based on this, the paper structures automator Z pre* as meeting L(Z pre* ) = pre*(l(z)). Time compexity for structuring Z pre* automator is O ( Q 3 ). Prove: There is ADPN M whose pattern is <g, α>, and automator A receives character string α = u 1 pu 2, automator Z = (Q, Σ, δ, q 0, F) receiving character string w = u 1 (g, p)u 2 can be easiy structured, then automator Z pre* = (Q, Σ, δ, q 0, F) is structured, wherein the rue of δ is as foows: Pubished by SCHOLINK INC. 290
5 Word Journa of Socia Science Research Vo. 4, No. 4, If (g, pγ) (g, p1 w 1 ), and q gp w 1 1 δ q, wherein q, q Q, then (qp, γ, q ) δ is true, where q p means the new state arrived after q receives character p. 2. If (g, pγ) (g, p1 w 1 ) ρ 2 w 2, and q gp w p w δ q, wherein q, q Q, then (qp, γ, q ) δ is true, wherein, q p means the new state arrived after q receives character p. As state Q is constant, structuring of automator Z pre* is aways terminabe. According to rue of migrating δ, efficient automator structuring method is adopted to structure Z pre*, with time compexity of structuring being O ( Q 3 ). Let <g, α> pre* (L(Z)), and<g, α> <g, α >, then <g, α > L(Z). Automator Z receives pattern <g, α >. It is derived from structuring rue of automator Z pre* that <g, α> L(Z pre* ). Let <g, α> L(Z pre* ), and <g, α> <g, α >, it is derived from structuring rue of Zpre* that <g, α > L(Z), and it is concuded that <g, α> pre*(l(z)). So L(Z pre* ) = pre*(l(z)) is true. q.e.d. To combine the state of hedge-automator and corresponding ADPN s oca state into a new state, and reaize execution mode of tree semantics for migration sequence, frist a specia ADPN mode M T = (G, P S, Γ, L,, g ) is structured, whose pattern is C T Conf M T, and form is as foows: C T: = {(g,(p 1, s 1 )w 1...(p n,s n )w n ) (g,p 1 w 1...p n w n ) C i.1 i n. A 1.s i A 1 D L <g,p i w i > L(A 1 )} The new pattern C T combines state in hedge-automator H with the oca state of each of its corresponding mode M, with form being (g,(p,s)γ). Goba migration rue g of ADPN mode M T is defined as foows: [Non-dynamic creation rue] ( g,( ps, ) γ ) ( g,( p, s ) w) g ( g, pγ ) ( g, pw) s s D g N is true, when and ony when is true. [Dynamic creation rue] ( g,( ps, ) γ ) ( g,( p, s ) w) ( p, s) w s s g is true, when and ony when ( g, pγ ) ( g, pw ) p w s s s D s s g s S is true. Loca migration rue is defined as foows: [Non-dynamic creation rue] ( ps, ) γ ( p, s ) w is true, when and ony when pγ pw s s D N is true. Pubished by SCHOLINK INC. 291
6 Word Journa of Socia Science Research Vo. 4, No. 4, 2017 [Dynamic creation rue] ( ps, ) γ ( p, s ) w ( p, s) w s s g is true, when and ony when pγ pw pw s s s D s s g s S is true. Definition 2 (backward reachabe pattern under tree semantics). There is given ADPN M, whose pattern C = (g, α), C Conf M, where α is corresponding DPN pattern. As pattern α can be received by automator A, the form can aso be C = (g, A). It is known that execution tree H T M *, and backward reachabe patterns set based on tree semantics is defined as foows: pre [ H ]( C ) : = {( g, α) Conf ( g, α ) C, h H.( g, α) M ( g, α )} M M h where H is reguar execution tree. As C is reguar set, so pre M [H](C ) is aso kept reguar, and pre M [H](C ) can be received by structuring automator. However, reachabiity probem of ADPN under tree sementics remain undecidabe, and context-bounded technoogy is adopted to sove this probem. Definition pre K,M [H](C ) represents the K-context-bounded backward reachabe patterns set that starts from pattern C under mode M. Cacuation of pre K,M [H](C ) can be divided into K steps: first cacuate pre 1,M [H](C ), i.e., cacuate backward patterns set starting from pattern C and with context switching not occurring. For a patterns set pre 1,M [H](C ) cacuated from previous context, and for a g G, if (g, u ) pre 1,M [H](C ), then cacuate pre 1,M [H](g, u ). Cacuate recursivey ike this unti finishing cacuating K contexts, to get K-context-bounded backward reachabe patterns set. Foowing is anaysis on how to cacuate pre 1,M [H](g, u). As DPN automator A receives character string u 1 (p, s)u 2, automator Z receiving a character string u 1 (g,(p,s))u 2 can be structured, where u 1 (p, s)u 2 L(A), u 1 ((P, S)Γ*)*,p P,u 2 Γ*((P, S)Γ*)*. According to theorum 1, the automator Z pre* can be structured, hence, foowing is derived: pre 1,M [H](g,u) = + ( g,{ w ( PΓ *) : w = upu u( g, p) u L( Z )}) g G pre* The patterns set pre 1,M [H](C ) cacuated each time is of (G,((P, S)Γ*)*) form. In oca state, S represents execution tree represented by hedge-automator in cacuating reachabe pattern. To get the patterns set of origina mode, a projection operation proj T : 2 ConfM T 2 ConfM is defined. proj T (C) = {(g,p 1 w 1... p n w n ) s 1,...s n S. s 1,...s n L(A 0 ) (g,(p 1, s 1 )w 1...(p n, s n )w n ) C } A backward reachabe agorithm can be derived from above anaysis, as shown in Figure 2. Pubished by SCHOLINK INC. 292
7 Word Journa of Socia Science Research Vo. 4, No. 4, 2017 Input: ADPN M,tupe M = (g, A) and integer k and pattern C Output: Backward reachabe patterns set pre*(c) 1. Structure hedge-automator T according to the rue as stated in section 3; 2. M M T; //Structure a new mode according to mode M and automator T of M s execution tree. 3. reachabe φ, eve = 0; //initiaize reachabe set and context-boundary identifier. 4. reachabe pre 1,M[H](g, A); //Cacuate a reachabe patterns in the first context. 5. C0 pre1, M[H](g, A); //intermediate resut is temporariy saved in C0 set. 6. eve++; 7. A = oca (C0 (g, (PΓ*)+)); //Update oca state pattern. 8. whie(eve k) // Time of context-boundary is K. 10. {for a g G. 11. {A = oca (Ceve -1 (g, (PΓ*)+)); //Update oca state pattern. 12. Ceve pre1, M[H](g, A); } //intermediate resut is temporariy saved in Ceve set. 13. reachabe Ceve; //Put a reachabe patterns in each context into reachabe. 14. eve++;}. 15. projt(reachabe); //Conduct projection operation for patterns set. Figure 2. Reverse Reachabiity Agorithm Based on Tree Semantics The first ine simuates execution mode of tree semantics for migration sequence by structuring an intermediate mode M. whie cycicay contros K context-boundaries. oca() represents the operation of projecting ADPN patterns to DPN pattern. C eve represents cacuating reachabe pattern under the eveth context. pre 1,M [H]() operation represents a possibe reachabe patterns sets in each context. As the patterns sets from reach abe sets are patterns set of intermediate mode M, the pattern of reach abe pattern set reachabe is subjected to projection to get reachabe patterns set under mode M. 5. Anaysis on Agorithm The compexity of agorithm suggested herein is O( G k-1 Q 3 ). The compexity of new mode structured via given mode M and execution tree H is inear compexity. According to theorem 1, the time compexity for structuring of automator Z pre* each time is Q 3, as the time for context-boundary is k, the execution sequence g 1 g k-1 G k-1 for for oop in the worst case has G k-1 possibiities. proj T () function is inear compexity, hence the compexity of agorithm is O( G k-1 Q 3 ), which has certain advantages over the agorithms such as k-deimited DPN reachabiity anaysis, etc. 6. Concusion The tree semantics simuates the running of concurrent program more accuratey than intereaving semantics and extends modeing capacity of mode (such as being abe to show which thread the migration beongs to), and can more efficienty conduct backward reachabiity anaysis than intereaving semantics. To make the reachabiity probem decidabe, the agorithm adopts context-bounded approach to make backward reachabiity anaysis on ADPN, and structures an intermediate mode to reaize Pubished by SCHOLINK INC. 293
8 Word Journa of Socia Science Research Vo. 4, No. 4, 2017 execution mode of semantics. Besides, it combines the state of hedge-automator and corresponding mode state into a new state to cacuate reachabe pattern of this intermediate mode. Lasty, projection operation is conducted to get the patterns set on origina mode, and compexity of agorithm is presented to we sove the reachabiity probem under this mode. The key content in future research wi be foowing two aspects: 1) Combine summarization technoogy and optimize the agorithm by dint of summary course being abstract and abe to be reused for many times; 2) As the agorithm herein can ony be used in abstract modes with imited goba variabes, next it is considered to extend it to abstract modes with infinite goba variabes. References Abdua, P. A. et a. (2014). Budget-bounded mode-checking pushdown systems. Forma Methods in System Design, 2014, Atig, M. F., Abdua, P. A., Kumar, K. N., & Saivasan, P. (2012). Linear time mode-checking for mutithread programs under scope-bounding//proceedings of the 10th internationa symposium on automated technoogy for verification and anaysis. Thiruvananthapuram, 2012, Bouajjani, A., Esparza, J., Schwoon, S., & Strejcek, J. (2005). Reachabiity anaysis of mutithreaded software with asynchronous communication. In Proc. of FSTTCS (Vo. 2005, pp ). Hyderabad: Springer. Bouajjani, A., Müer-Om, M., & Touii, T. (2005). Reguar symboic anaysis of dynamic networks of pushdown systems. In Proceedings of the 16th Internationa Conference on Concurrency Theory (pp ). Emmi, M. et a. (2015). Anaysis of Asynchronous Programs with Event-Based Synchronization. In Programming Languages and Systems (pp ). Springer Berin Heideberg. Faouzi Atig, M., Bouajjani, A., & Qadeer, S. (2009). Context-bounded anaysis for concurrent programs with dynamic creation of threads. In Proceedings of the 15th Internationa Conference on TACAS, LNCS 5505 (Vo. 2009, pp ). Univ York: European Assoc. Gawitza, T. M., Lammich, P., Müer-Om, M., Seid, H., & Wenner, A. (2011). Join-Lock-Sensitive forward reachabiity anaysis for concurrent programs with dynamic process creation. In Proceeding of the 12th internationa conference on verification, mode checking, LNCS 6538 (pp ). Irigoin, F., Jouveot, P., & Trioet, R. (2014). Semantica interprocedura paraeization: An overview of the PIPS project. In 25th Anniversary Internationa Conference on Supercomputing Anniversary (Vo. 2014, pp ). Pubished by SCHOLINK INC. 294
9 Word Journa of Socia Science Research Vo. 4, No. 4, 2017 Kahon, V., & Gupta, A. (2006). An automata-theoretic approach for mode checking threads for LTL properties. In Proceedings of the 21st Annua IEEE Symposium on Logic in Computer Society (pp ). Swatte: LICS Lammich, P., Müer-Om, M., & Wenner, A. (2009). Predecessor sets of dynamic pushdown networks with tree-reguar constraints. In Proceedings of CAV (pp ). Grenobe: Artist Design. Li, X., & Qian, J. Y. (2016). Research on k-deimited accessibiity anaysis for dynamic pushdown network. Journa of Guiin university of eectronic technoogy, 36(1), Musuvathi, M., & Qadeer, S. (2007). Iterative context bounding for systematic testing of mutithreaded programs. Conference on PLDI, 2007, Pun, K. I., Steffen, M., & Stoz, V. (2014). Effect-poymorphic behaviour inference for deadock checking. In Software Engineering and Forma Methods (pp ). Springer Internationa Pubishing. Qian, J. Y. et a. (2016). Verification of rea-time systems with time muti-pushdown net. Chinese journa of computers, 39(11), Wenner, A. (2010). Weighted dynamic pushdown networks. In Programming Languages and Systems (Vo. 2010, pp ). Heideberg: Springer. Pubished by SCHOLINK INC. 295
Secure Information Flow Based on Data Flow Analysis
SSN 746-7659, Engand, UK Journa of nformation and Computing Science Vo., No. 4, 007, pp. 5-60 Secure nformation Fow Based on Data Fow Anaysis Jianbo Yao Center of nformation and computer, Zunyi Norma Coege,
More informationA Novel Learning Method for Elman Neural Network Using Local Search
Neura Information Processing Letters and Reviews Vo. 11, No. 8, August 2007 LETTER A Nove Learning Method for Eman Neura Networ Using Loca Search Facuty of Engineering, Toyama University, Gofuu 3190 Toyama
More informationCombining reaction kinetics to the multi-phase Gibbs energy calculation
7 th European Symposium on Computer Aided Process Engineering ESCAPE7 V. Pesu and P.S. Agachi (Editors) 2007 Esevier B.V. A rights reserved. Combining reaction inetics to the muti-phase Gibbs energy cacuation
More informationAn Algorithm for Pruning Redundant Modules in Min-Max Modular Network
An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai
More informationIterative Decoding Performance Bounds for LDPC Codes on Noisy Channels
Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University
More informationA Solution to the 4-bit Parity Problem with a Single Quaternary Neuron
Neura Information Processing - Letters and Reviews Vo. 5, No. 2, November 2004 LETTER A Soution to the 4-bit Parity Probem with a Singe Quaternary Neuron Tohru Nitta Nationa Institute of Advanced Industria
More informationSymbolic models for nonlinear control systems using approximate bisimulation
Symboic modes for noninear contro systems using approximate bisimuation Giordano Poa, Antoine Girard and Pauo Tabuada Abstract Contro systems are usuay modeed by differentia equations describing how physica
More informationConverting Z-number to Fuzzy Number using. Fuzzy Expected Value
ISSN 1746-7659, Engand, UK Journa of Information and Computing Science Vo. 1, No. 4, 017, pp.91-303 Converting Z-number to Fuzzy Number using Fuzzy Expected Vaue Mahdieh Akhbari * Department of Industria
More informationTwo Kinds of Parabolic Equation algorithms in the Computational Electromagnetics
Avaiabe onine at www.sciencedirect.com Procedia Engineering 9 (0) 45 49 0 Internationa Workshop on Information and Eectronics Engineering (IWIEE) Two Kinds of Paraboic Equation agorithms in the Computationa
More informationBP neural network-based sports performance prediction model applied research
Avaiabe onine www.jocpr.com Journa of Chemica and Pharmaceutica Research, 204, 6(7:93-936 Research Artice ISSN : 0975-7384 CODEN(USA : JCPRC5 BP neura networ-based sports performance prediction mode appied
More informationSteepest Descent Adaptation of Min-Max Fuzzy If-Then Rules 1
Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rues 1 R.J. Marks II, S. Oh, P. Arabshahi Λ, T.P. Caude, J.J. Choi, B.G. Song Λ Λ Dept. of Eectrica Engineering Boeing Computer Services University
More informationResearch Article Solution of Point Reactor Neutron Kinetics Equations with Temperature Feedback by Singularly Perturbed Method
Science and Technoogy of Nucear Instaations Voume 213, Artice ID 261327, 6 pages http://dx.doi.org/1.1155/213/261327 Research Artice Soution of Point Reactor Neutron Kinetics Equations with Temperature
More informationT.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA
ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network
More informationA Brief Introduction to Markov Chains and Hidden Markov Models
A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,
More informationUnconditional security of differential phase shift quantum key distribution
Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice
More informationSardinas-Patterson like algorithms in coding theory
A.I.Cuza University of Iaşi Facuty of Computer Science Sardinas-Patterson ike agorithms in coding theory Author, Bogdan Paşaniuc Supervisor, Prof. dr. Ferucio Laurenţiu Ţipea Iaşi, September 2003 Contents
More informationGeneralized multigranulation rough sets and optimal granularity selection
Granu. Comput. DOI 10.1007/s41066-017-0042-9 ORIGINAL PAPER Generaized mutigranuation rough sets and optima granuarity seection Weihua Xu 1 Wentao Li 2 Xiantao Zhang 1 Received: 27 September 2016 / Accepted:
More informationAsynchronous Control for Coupled Markov Decision Systems
INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of
More informationSchedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness
1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea-Time Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process
More informationConstrained Dynamic Tree Networks
Constrained Dynamic Tree Networks Matthew Hague 1 and Vincent Penelle 2 1 Royal Holloway, University of London matthew.hague@rhul.ac.uk 2 Université de Bordeaux, LaBRI, UMR 5800, Talence, France vincent.penelle@labri.fr
More informationA. Distribution of the test statistic
A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch
More informationReachability analysis of multithreaded software with asynchronous communication
Reachability analysis of multithreaded software with asynchronous communication Ahmed Bouajjani 1, Javier Esparza 2, Stefan Schwoon 2, and Jan Strejček 2 1 LIAFA, University of Paris 7, abou@liafa.jussieu.fr
More informationSimplified analysis of EXAFS data and determination of bond lengths
Indian Journa of Pure & Appied Physics Vo. 49, January 0, pp. 5-9 Simpified anaysis of EXAFS data and determination of bond engths A Mishra, N Parsai & B D Shrivastava * Schoo of Physics, Devi Ahiya University,
More informationTHE OUT-OF-PLANE BEHAVIOUR OF SPREAD-TOW FABRICS
ECCM6-6 TH EUROPEAN CONFERENCE ON COMPOSITE MATERIALS, Sevie, Spain, -6 June 04 THE OUT-OF-PLANE BEHAVIOUR OF SPREAD-TOW FABRICS M. Wysocki a,b*, M. Szpieg a, P. Heström a and F. Ohsson c a Swerea SICOMP
More informationTracking Control of Multiple Mobile Robots
Proceedings of the 2001 IEEE Internationa Conference on Robotics & Automation Seou, Korea May 21-26, 2001 Tracking Contro of Mutipe Mobie Robots A Case Study of Inter-Robot Coision-Free Probem Jurachart
More informationHRL-Local Infinite Triangular Array Languages
1 Engineering, echnoogy echniques Vo.59: e16161076, January-December 2016 http://dx.doi.org/10.1590/1678-4324-2016161076 ISSN 1678-4324 Onine Edition BRAZILIAN ARCHIVES OF BIOLOGY AND ECHNOLOGY A N I N
More informationStructural Control of Probabilistic Boolean Networks and Its Application to Design of Real-Time Pricing Systems
Preprints of the 9th Word Congress The Internationa Federation of Automatic Contro Structura Contro of Probabiistic Booean Networks and Its Appication to Design of Rea-Time Pricing Systems Koichi Kobayashi
More informationABOUT THE FUNCTIONING OF THE SPECIAL-PURPOSE CALCULATING UNIT BASED ON THE LINEAR SYSTEM SOLUTION USING THE FIRST ORDER DELTA- TRANSFORMATIONS
ABOUT THE FUNCTIONING OF THE SPECIAL-PURPOSE CALCULATING UNIT BASED ON THE LINEAR SYSTEM SOLUTION USING THE FIRST ORDER DELTA- TRANSFORMATIONS 1 LIUBOV VLADIMIROVNA PIRSKAYA, 2 NAIL SHAVKYATOVISH KHUSAINOV
More informationUniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete
Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity
More informationCryptanalysis of PKP: A New Approach
Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in
More informationPublished in: Proceedings of the Twenty Second Nordic Seminar on Computational Mechanics
Aaborg Universitet An Efficient Formuation of the Easto-pastic Constitutive Matrix on Yied Surface Corners Causen, Johan Christian; Andersen, Lars Vabbersgaard; Damkide, Lars Pubished in: Proceedings of
More informationDistributed average consensus: Beyond the realm of linearity
Distributed average consensus: Beyond the ream of inearity Usman A. Khan, Soummya Kar, and José M. F. Moura Department of Eectrica and Computer Engineering Carnegie Meon University 5 Forbes Ave, Pittsburgh,
More informationA Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c)
A Simpe Efficient Agorithm of 3-D Singe-Source Locaization with Uniform Cross Array Bing Xue a * Guangyou Fang b Yicai Ji c Key Laboratory of Eectromagnetic Radiation Sensing Technoogy, Institute of Eectronics,
More informationEffect of transport ratio on source term in determination of surface emission coefficient
Internationa Journa of heoretica & Appied Sciences, (): 74-78(9) ISSN : 975-78 Effect of transport ratio on source term in determination of surface emission coefficient Sanjeev Kumar and Apna Mishra epartment
More informationMathematical Scheme Comparing of. the Three-Level Economical Systems
Appied Mathematica Sciences, Vo. 11, 2017, no. 15, 703-709 IKAI td, www.m-hikari.com https://doi.org/10.12988/ams.2017.7252 Mathematica Scheme Comparing of the Three-eve Economica Systems S.M. Brykaov
More informationTheory of Generalized k-difference Operator and Its Application in Number Theory
Internationa Journa of Mathematica Anaysis Vo. 9, 2015, no. 19, 955-964 HIKARI Ltd, www.m-hiari.com http://dx.doi.org/10.12988/ijma.2015.5389 Theory of Generaized -Difference Operator and Its Appication
More informationA Statistical Framework for Real-time Event Detection in Power Systems
1 A Statistica Framework for Rea-time Event Detection in Power Systems Noan Uhrich, Tim Christman, Phiip Swisher, and Xichen Jiang Abstract A quickest change detection (QCD) agorithm is appied to the probem
More informationMultilayer Kerceptron
Mutiayer Kerceptron Zotán Szabó, András Lőrincz Department of Information Systems, Facuty of Informatics Eötvös Loránd University Pázmány Péter sétány 1/C H-1117, Budapest, Hungary e-mai: szzoi@csetehu,
More informationAn Operational Semantics for Weak PSL
An Operationa Semantics for Weak PSL Koen Caessen 1,2 and Johan Mårtensson 1,3 {koen,johan}@safeogic.se 1 Safeogic AB 2 Chamers University of Technoogy 3 Gothenburg University Abstract. Extending inear
More informationMaximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR
1 Maximizing Sum Rate and Minimizing MSE on Mutiuser Downink: Optimaity, Fast Agorithms and Equivaence via Max-min SIR Chee Wei Tan 1,2, Mung Chiang 2 and R. Srikant 3 1 Caifornia Institute of Technoogy,
More informationStochastic Automata Networks (SAN) - Modelling. and Evaluation. Paulo Fernandes 1. Brigitte Plateau 2. May 29, 1997
Stochastic utomata etworks (S) - Modeing and Evauation Pauo Fernandes rigitte Pateau 2 May 29, 997 Institut ationa Poytechnique de Grenobe { IPG Ecoe ationae Superieure d'informatique et de Mathematiques
More informationCONCHOID OF NICOMEDES AND LIMACON OF PASCAL AS ELECTRODE OF STATIC FIELD AND AS WAVEGUIDE OF HIGH FREQUENCY WAVE
Progress In Eectromagnetics Research, PIER 30, 73 84, 001 CONCHOID OF NICOMEDES AND LIMACON OF PASCAL AS ELECTRODE OF STATIC FIELD AND AS WAVEGUIDE OF HIGH FREQUENCY WAVE W. Lin and Z. Yu University of
More informationA proposed nonparametric mixture density estimation using B-spline functions
A proposed nonparametric mixture density estimation using B-spine functions Atizez Hadrich a,b, Mourad Zribi a, Afif Masmoudi b a Laboratoire d Informatique Signa et Image de a Côte d Opae (LISIC-EA 4491),
More informationNonperturbative Shell Correction to the Bethe Bloch Formula for the Energy Losses of Fast Charged Particles
ISSN 002-3640, JETP Letters, 20, Vo. 94, No., pp. 5. Peiades Pubishing, Inc., 20. Origina Russian Text V.I. Matveev, D.N. Makarov, 20, pubished in Pis ma v Zhurna Eksperimenta noi i Teoreticheskoi Fiziki,
More informationMinimizing Total Weighted Completion Time on Uniform Machines with Unbounded Batch
The Eighth Internationa Symposium on Operations Research and Its Appications (ISORA 09) Zhangiaie, China, September 20 22, 2009 Copyright 2009 ORSC & APORC, pp. 402 408 Minimizing Tota Weighted Competion
More informationACTIVE electrical networks, which require energizing sources for their operation, are most widely
1 Stabiization heory For Active Muti-port Networks Mayuresh Bakshi Member, IEEE,, Virendra R Sue and Maryam Shoejai Baghini, Senior Member, IEEE, arxiv:1606.03194v1 [cs.sy] 10 Jun 2016 Abstract his paper
More informationAppendix A: MATLAB commands for neural networks
Appendix A: MATLAB commands for neura networks 132 Appendix A: MATLAB commands for neura networks p=importdata('pn.xs'); t=importdata('tn.xs'); [pn,meanp,stdp,tn,meant,stdt]=prestd(p,t); for m=1:10 net=newff(minmax(pn),[m,1],{'tansig','purein'},'trainm');
More informationResearch of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance
Send Orders for Reprints to reprints@benthamscience.ae 340 The Open Cybernetics & Systemics Journa, 015, 9, 340-344 Open Access Research of Data Fusion Method of Muti-Sensor Based on Correation Coefficient
More informationLimited magnitude error detecting codes over Z q
Limited magnitude error detecting codes over Z q Noha Earief choo of Eectrica Engineering and Computer cience Oregon tate University Corvais, OR 97331, UA Emai: earief@eecsorstedu Bea Bose choo of Eectrica
More informationData Search Algorithms based on Quantum Walk
Data Search Agorithms based on Quantum Wak Masataka Fujisaki, Hiromi Miyajima, oritaka Shigei Abstract For searching any item in an unsorted database with items, a cassica computer takes O() steps but
More informationConstruction of Supersaturated Design with Large Number of Factors by the Complementary Design Method
Acta Mathematicae Appicatae Sinica, Engish Series Vo. 29, No. 2 (2013) 253 262 DOI: 10.1007/s10255-013-0214-6 http://www.appmath.com.cn & www.springerlink.com Acta Mathema cae Appicatae Sinica, Engish
More informationRecursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines
Recursive Constructions of Parae FIFO and LIFO Queues with Switched Deay Lines Po-Kai Huang, Cheng-Shang Chang, Feow, IEEE, Jay Cheng, Member, IEEE, and Duan-Shin Lee, Senior Member, IEEE Abstract One
More informationReachability Analysis of Multithreaded Software with Asynchronous Communication
Reachability Analysis of Multithreaded Software with Asynchronous Communication Ahmed Bouajjani 1, Javier Esparza, Stefan Schwoon, and Jan Strejček 1 LIAFA, University of Paris 7, abou@liafa.jussieu.fr
More informationSchedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness
1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea- Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process Management,
More informationLecture Note 3: Stationary Iterative Methods
MATH 5330: Computationa Methods of Linear Agebra Lecture Note 3: Stationary Iterative Methods Xianyi Zeng Department of Mathematica Sciences, UTEP Stationary Iterative Methods The Gaussian eimination (or
More informationReliability Improvement with Optimal Placement of Distributed Generation in Distribution System
Reiabiity Improvement with Optima Pacement of Distributed Generation in Distribution System N. Rugthaicharoencheep, T. Langtharthong Abstract This paper presents the optima pacement and sizing of distributed
More informationAdjustment of automatic control systems of production facilities at coal processing plants using multivariant physico- mathematical models
IO Conference Series: Earth and Environmenta Science AER OEN ACCESS Adjustment of automatic contro systems of production faciities at coa processing pants using mutivariant physico- mathematica modes To
More informationSolution of Wave Equation by the Method of Separation of Variables Using the Foss Tools Maxima
Internationa Journa of Pure and Appied Mathematics Voume 117 No. 14 2017, 167-174 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-ine version) ur: http://www.ijpam.eu Specia Issue ijpam.eu Soution
More informationConvergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems
Convergence Property of the Iri-Imai Agorithm for Some Smooth Convex Programming Probems S. Zhang Communicated by Z.Q. Luo Assistant Professor, Department of Econometrics, University of Groningen, Groningen,
More informationarxiv: v1 [math.fa] 23 Aug 2018
An Exact Upper Bound on the L p Lebesgue Constant and The -Rényi Entropy Power Inequaity for Integer Vaued Random Variabes arxiv:808.0773v [math.fa] 3 Aug 08 Peng Xu, Mokshay Madiman, James Mebourne Abstract
More informationInductive Bias: How to generalize on novel data. CS Inductive Bias 1
Inductive Bias: How to generaize on nove data CS 478 - Inductive Bias 1 Overfitting Noise vs. Exceptions CS 478 - Inductive Bias 2 Non-Linear Tasks Linear Regression wi not generaize we to the task beow
More informationResearch on liquid sloshing performance in vane type tank under microgravity
IOP Conference Series: Materias Science and Engineering PAPER OPEN ACCESS Research on iquid soshing performance in vane type tan under microgravity Reated content - Numerica simuation of fuid fow in the
More informationXSAT of linear CNF formulas
XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open
More information8 Digifl'.11 Cth:uits and devices
8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,
More information1D Heat Propagation Problems
Chapter 1 1D Heat Propagation Probems If the ambient space of the heat conduction has ony one dimension, the Fourier equation reduces to the foowing for an homogeneous body cρ T t = T λ 2 + Q, 1.1) x2
More informationStochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract
Stochastic Compement Anaysis of Muti-Server Threshod Queues with Hysteresis John C.S. Lui The Dept. of Computer Science & Engineering The Chinese University of Hong Kong Leana Goubchik Dept. of Computer
More informationApproximation and Fast Calculation of Non-local Boundary Conditions for the Time-dependent Schrödinger Equation
Approximation and Fast Cacuation of Non-oca Boundary Conditions for the Time-dependent Schrödinger Equation Anton Arnod, Matthias Ehrhardt 2, and Ivan Sofronov 3 Universität Münster, Institut für Numerische
More informationStudy on Fusion Algorithm of Multi-source Image Based on Sensor and Computer Image Processing Technology
Sensors & Transducers 3 by IFSA http://www.sensorsporta.com Study on Fusion Agorithm of Muti-source Image Based on Sensor and Computer Image Processing Technoogy Yao NAN, Wang KAISHENG, 3 Yu JIN The Information
More informationpp in Backpropagation Convergence Via Deterministic Nonmonotone Perturbed O. L. Mangasarian & M. V. Solodov Madison, WI Abstract
pp 383-390 in Advances in Neura Information Processing Systems 6 J.D. Cowan, G. Tesauro and J. Aspector (eds), Morgan Kaufmann Pubishers, San Francisco, CA, 1994 Backpropagation Convergence Via Deterministic
More informationPolar Snakes: a fast and robust parametric active contour model
Poar Snakes: a fast and robust parametric active contour mode Christophe Coewet To cite this version: Christophe Coewet. Poar Snakes: a fast and robust parametric active contour mode. IEEE Int. Conf. on
More informationPath planning with PH G2 splines in R2
Path panning with PH G2 spines in R2 Laurent Gajny, Richard Béarée, Eric Nyiri, Oivier Gibaru To cite this version: Laurent Gajny, Richard Béarée, Eric Nyiri, Oivier Gibaru. Path panning with PH G2 spines
More information(f) is called a nearly holomorphic modular form of weight k + 2r as in [5].
PRODUCTS OF NEARLY HOLOMORPHIC EIGENFORMS JEFFREY BEYERL, KEVIN JAMES, CATHERINE TRENTACOSTE, AND HUI XUE Abstract. We prove that the product of two neary hoomorphic Hece eigenforms is again a Hece eigenform
More informationMARKOV CHAINS AND MARKOV DECISION THEORY. Contents
MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After
More informationApproximate Bandwidth Allocation for Fixed-Priority-Scheduled Periodic Resources (WSU-CS Technical Report Version)
Approximate Bandwidth Aocation for Fixed-Priority-Schedued Periodic Resources WSU-CS Technica Report Version) Farhana Dewan Nathan Fisher Abstract Recent research in compositiona rea-time systems has focused
More informationVerification of telecommunication protocols based on formal methods
Internationa Journa of Inteigent Information Systems 01; (1) : 1-10 Pubished onine February 0, 01 (http://www.sciencepubishinggroup.com/j/ijiis) doi: 10.11648/j. ijiis.01001.11 Verification of teecommunication
More informationSupporting Information for Suppressing Klein tunneling in graphene using a one-dimensional array of localized scatterers
Supporting Information for Suppressing Kein tunneing in graphene using a one-dimensiona array of ocaized scatterers Jamie D Was, and Danie Hadad Department of Chemistry, University of Miami, Cora Gabes,
More informationImproving the Reliability of a Series-Parallel System Using Modified Weibull Distribution
Internationa Mathematica Forum, Vo. 12, 217, no. 6, 257-269 HIKARI Ltd, www.m-hikari.com https://doi.org/1.12988/imf.217.611155 Improving the Reiabiity of a Series-Parae System Using Modified Weibu Distribution
More informationFirst-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries
c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische
More informationFORECASTING TELECOMMUNICATIONS DATA WITH AUTOREGRESSIVE INTEGRATED MOVING AVERAGE MODELS
FORECASTING TEECOMMUNICATIONS DATA WITH AUTOREGRESSIVE INTEGRATED MOVING AVERAGE MODES Niesh Subhash naawade a, Mrs. Meenakshi Pawar b a SVERI's Coege of Engineering, Pandharpur. nieshsubhash15@gmai.com
More informationHow the backpropagation algorithm works Srikumar Ramalingam School of Computing University of Utah
How the backpropagation agorithm works Srikumar Ramaingam Schoo of Computing University of Utah Reference Most of the sides are taken from the second chapter of the onine book by Michae Nieson: neuranetworksanddeepearning.com
More informationNumerical Simulation for Optimizing Temperature Gradients during Single Crystal Casting Process
ISIJ Internationa Vo 54 (2014) No 2 pp 254 258 Numerica Simuation for Optimizing Temperature Gradients during Singe Crysta Casting Process Aeksandr Aeksandrovich INOZEMTSEV 1) Aeksandra Sergeevna DUBROVSKAYA
More informationChemical Kinetics Part 2
Integrated Rate Laws Chemica Kinetics Part 2 The rate aw we have discussed thus far is the differentia rate aw. Let us consider the very simpe reaction: a A à products The differentia rate reates the rate
More informationSome Measures for Asymmetry of Distributions
Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester
More informationMultigrid Method for Elliptic Control Problems
J OHANNES KEPLER UNIVERSITÄT LINZ Netzwerk f ür Forschung, L ehre und Praxis Mutigrid Method for Eiptic Contro Probems MASTERARBEIT zur Erangung des akademischen Grades MASTER OF SCIENCE in der Studienrichtung
More informationarxiv: v1 [math.ca] 6 Mar 2017
Indefinite Integras of Spherica Besse Functions MIT-CTP/487 arxiv:703.0648v [math.ca] 6 Mar 07 Joyon K. Boomfied,, Stephen H. P. Face,, and Zander Moss, Center for Theoretica Physics, Laboratory for Nucear
More informationPairwise RNA Edit Distance
Pairwise RNA Edit Distance In the foowing: Sequences S 1 and S 2 associated structures P 1 and P 2 scoring of aignment: different edit operations arc atering arc removing 1) ACGUUGACUGACAACAC..(((...)))...
More information830. Nonlinear dynamic characteristics of SMA simply supported beam in axial stochastic excitation
8. Noninear dynamic characteristics of SMA simpy supported beam in axia stochastic excitation Zhi-Wen Zhu 1, Wen-Ya Xie, Jia Xu 1 Schoo of Mechanica Engineering, Tianjin University, 9 Weijin Road, Tianjin
More informationWidth of Percolation Transition in Complex Networks
APS/23-QED Width of Percoation Transition in Compex Networs Tomer Kaisy, and Reuven Cohen 2 Minerva Center and Department of Physics, Bar-Ian University, 52900 Ramat-Gan, Israe 2 Department of Computer
More informationIn-plane shear stiffness of bare steel deck through shell finite element models. G. Bian, B.W. Schafer. June 2017
In-pane shear stiffness of bare stee deck through she finite eement modes G. Bian, B.W. Schafer June 7 COLD-FORMED STEEL RESEARCH CONSORTIUM REPORT SERIES CFSRC R-7- SDII Stee Diaphragm Innovation Initiative
More informationAn approximate method for solving the inverse scattering problem with fixed-energy data
J. Inv. I-Posed Probems, Vo. 7, No. 6, pp. 561 571 (1999) c VSP 1999 An approximate method for soving the inverse scattering probem with fixed-energy data A. G. Ramm and W. Scheid Received May 12, 1999
More informationImproving the Accuracy of Boolean Tomography by Exploiting Path Congestion Degrees
Improving the Accuracy of Booean Tomography by Expoiting Path Congestion Degrees Zhiyong Zhang, Gaoei Fei, Fucai Yu, Guangmin Hu Schoo of Communication and Information Engineering, University of Eectronic
More informationTurbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University
Turbo Codes Coding and Communication Laboratory Dept. of Eectrica Engineering, Nationa Chung Hsing University Turbo codes 1 Chapter 12: Turbo Codes 1. Introduction 2. Turbo code encoder 3. Design of intereaver
More informationAnalysis of the problem of intervention control in the economy on the basis of solving the problem of tuning
Anaysis of the probem of intervention contro in the economy on the basis of soving the probem of tuning arxiv:1811.10993v1 q-fin.gn] 9 Nov 2018 1 st eter Shnurov Nationa Research University Higher Schoo
More informationTHINKING IN PYRAMIDS
ECS 178 Course Notes THINKING IN PYRAMIDS Kenneth I. Joy Institute for Data Anaysis and Visuaization Department of Computer Science University of Caifornia, Davis Overview It is frequenty usefu to think
More informationLTL Model-Checking for Dynamic Pushdown Networks Communicating via Locks
LTL Model-Checking for Dynamic Pushdown Networks Communicating via Locks Fu Song, Tayssir Touili To cite this version: Fu Song, Tayssir Touili. LTL Model-Checking for Dynamic Pushdown Networks Communicating
More informationStatistical Learning Theory: A Primer
Internationa Journa of Computer Vision 38(), 9 3, 2000 c 2000 uwer Academic Pubishers. Manufactured in The Netherands. Statistica Learning Theory: A Primer THEODOROS EVGENIOU, MASSIMILIANO PONTIL AND TOMASO
More informationA Fictitious Time Integration Method for a One-Dimensional Hyperbolic Boundary Value Problem
Journa o mathematics and computer science 14 (15) 87-96 A Fictitious ime Integration Method or a One-Dimensiona Hyperboic Boundary Vaue Probem Mir Saad Hashemi 1,*, Maryam Sariri 1 1 Department o Mathematics,
More informationMATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES
MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES Separation of variabes is a method to sove certain PDEs which have a warped product structure. First, on R n, a inear PDE of order m is
More informationNonlinear Gaussian Filtering via Radial Basis Function Approximation
51st IEEE Conference on Decision and Contro December 10-13 01 Maui Hawaii USA Noninear Gaussian Fitering via Radia Basis Function Approximation Huazhen Fang Jia Wang and Raymond A de Caafon Abstract This
More information6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7
6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17 Soution 7 Probem 1: Generating Random Variabes Each part of this probem requires impementation in MATLAB. For the
More information