Burst Cloning: A Proactive Scheme to Reduce Data Loss in Optical Burst-Switched Networks

Size: px
Start display at page:

Download "Burst Cloning: A Proactive Scheme to Reduce Data Loss in Optical Burst-Switched Networks"

Transcription

1 Burst Clonng: A Proactve Scheme to Reduce Data Loss n Optcal Burst-Swtched Networks Xaodong Huang, Vnod M. Vokkarane, and Jason P. Jue Department of Computer Scence, The Unversty of Texas at Dallas, TX Computer and Informaton Scence Department, The Unversty of Massachusetts Dartmouth, MA Emal: {xxh02000@utdallas.edu, vvokkarane@umas.edu, jjue@utdallas.edu} Abstract In ths paper, we propose a novel proactve scheme, burst clonng, to reduce data loss due to burst contenton n optcal burst-swtched (OBS) networks. The dea s to replcate a burst and send duplcated copes of the burst through the network smultaneously. If the orgnal burst s lost, the cloned burst may stll be able to reach the destnaton. Prmary desgn ssues n burst clonng are to select the optmal nodes at whch to do clonng and to prevent cloned bursts from contendng for resources wth orgnal bursts. An analytcal model s developed to evaluate the proposed scheme. The model s verfed through extensve smulatons. We observe that burst clonng could sgnfcantly reduce data loss n OBS networks. I. INTRODUCTION Optcal burst swtchng (OBS) s beleved to be an effectve paradgm to effcently utlze the huge bandwdth of wavelength dvson multplexng networks for bursty IP traffc []. At each ngress node, packets to the same egress node are packed together as a data burst, whch wll then be routed through the network all-optcally. The control nformaton for a data burst, contaned n a burst head packet (BHP), s separated from the data and s transmtted on a dedcated control channel. BHPs are processed electroncally at each ntermedate node to reserve network resources before the data burst arrves. A man concern n burst schedulng s the data loss due to burst contenton. A contenton occurs f and only f multple bursts contend for the same outgong channel on the same wavelength at the same tme nterval. Three well known contenton resoluton schemes are wavelength converson [2], fber delay lne bufferng [3], and deflecton routng [4]. When a contenton cannot be resolved, we can ether drop an entre burst or just drop the contendng part of a burst. The latter scheme, burst segmentaton [5], can further reduce packet loss. A common feature of the above solutons s that, f a burst (or a packet n a burst) s dropped, the burst (or the packet) can only be recovered by retransmsson at a hgher layer. In ths paper, we propose a new proactve scheme, burst clonng, to reduce data loss n OBS networks. The dea s to replcate a burst and send duplcated copes of the burst through the network smultaneously. If the orgnal burst s lost, the cloned burst may stll be able to reach the destnaton. The destnaton egress nodes, wth addtonal ntellgence, wll select one of the bursts, dsassemble the burst, and forward the packets on to the correspondng destnaton hosts. Prmary desgn ssues n burst clonng are to select the optmal nodes at whch to do clonng and to prevent cloned bursts from contendng for resources wth orgnal bursts. We nvestgate and provde solutons to both problems. An analytcal model s developed to evaluate the proposed scheme. The model s verfed through extensve smulatons. We observe that burst clonng could sgnfcantly reduce data loss n OBS networks. It s worth notng that burst clonng s not a replacement of, but a complement to, exstng contenton resoluton schemes. Burst clonng may be used along wth any exstng contenton resoluton scheme, whch makes the proposed scheme qute unversal and practcal. The rest of ths paper s organzed as follows. Secton II explans the aspects of the proposed scheme. In Secton III, we nvestgate node archtectures to support burst clonng. An analytcal model s developed n Secton IV and numercal results are shown n Secton V. We conclude the paper n Secton VI. II. BURST CLONING In ths secton, we descrbe the detals of burst clonng. We refer the orgnal copy of a burst as the orgnal burst, and the duplcated copy of a burst as the cloned burst. The traffc consstng of orgnal bursts and cloned bursts s referred to as orgnal traffc and cloned traffc, respectvely. The node at whch the clonng s done s referred to as the clonng node. In burst clonng, there are several aspects to be conered: the number of cloned bursts for each orgnal burst, the selecton of the clonng node, and the routng for the orgnal burst and the cloned burst. In burst clonng, one or more cloned bursts can be made for each orgnal burst. On one hand, f more copes are made for a burst, the possblty of data loss for the burst s lower. On the other hand, f more copes are made, then more cloned traffc s added to the network. Cloned bursts may contend for network resources wth orgnal bursts, whch may result n ncreasng loss for orgnal bursts, whch n turn may ncrease data loss nstead of reducng t. To prevent cloned traffc from nterferng wth orgnal traffc, we ntroduce a traffc solaton mechansm by usng prorty-based preemptve burst schedulng. Orgnal bursts are assgned hgh prorty whle cloned bursts are assgned low prorty. When schedulng bursts, the hgh prorty burst wll always be scheduled f there s a contenton between /05/$20.00 (C) 2005 IEEE 673

2 source node A 000 H common path 00 Orgnal Burst Fg.. clonng node C 00 H shortest path clonng path H3 H2 prmary path Cloned Burst General path structure for burst clonng destnaton node a hgh prorty burst and a low prorty burst, even f the low prorty burst has already been scheduled. From the hgh prorty traffc s pont of vew, there s no low prorty traffc present n the network. The traffc solaton guarantees that the performance s at least as good wth burst clonng as wthout clonng. Another vtal problem n burst clonng s the selecton of the clonng node for a burst. In prncple, the clonng node for each source destnaton par could be dfferent. A tghtly related problem s the routng of the orgnal burst and the cloned burst. The general path structure for burst clonng s shown n Fg.. An orgnal burst s frst sent along the common path. After the cloned copy s made at the clonng node, the orgnal burst wll then contnue along the prmary path whle the cloned burst wll be routed through the clonng path. The common path would be null f the clonng node s the source node. The prmary path and clonng path would be null f there s no clonng for the burst. (We can also vew ths stuaton as the case n whch the clonng node s the destnaton). Snce a cloned burst s a backup n case the orgnal burst s lost, t s reasonable to keep the loss of orgnal bursts as low as possble. Hence, we choose the common path and the prmary path to be on the shortest path from the source to the destnaton. Accordngly, the clonng node s on the shortest path between the node par. So we have: H + H 2 = H () where H, H 2, and H are the number of physcal hops of the common path, the prmary path, and the shortest path from the source to the destnaton, respectvely. After choosng the prmary path, we must make a decson on whether the clonng path should be lnk-dsjont or even node-dsjont from the prmary path. In ths paper we are amng to mnmze data loss, and are not conerng the protecton ssues. Therefore, the clonng path s allowed to be partally overlapped wth the prmary path, except on the frst hop of both paths. The clonng path, as the second shortest path, wll not be shorter than the prmary path. Then we have: H 3 H 2 0. (2) Even wth Equatons () and (2), t s stll not clear whch node along the shortest path should be the clonng node. B The schedulng of orgnal bursts, due to the traffc solaton mechansm, s ndependent of the selecton of the clonng nodes. Hence, we focus on the cloned bursts. On one hand, f the orgnal burst s lost on the common path, the burst cannot be cloned. Thus, the common path should be shorter. On the other hand, the shorter the common path, the longer the prmary path by equaton (), and the longer the clonng path by equaton (2). Ths may n turn result n hgher loss for cloned bursts. Thus a trade-off must exst between these two factors to acheve the best performance. Through our analytcal model and smulatons, we fnd that the former factor has a much greater effect on performance. One brute force approach to fnd the optmal clonng node s to enumerate all possble clonng node confguratons. For an OBS network wth N nodes, there N(N ) sourcedestnaton pars. It may be mpractcal to try all possble clonng confguratons. As a compromse, n ths paper we frst classfy source-destnaton pars nto D categores, where D s the dameter of a network. We set one clonng confguraton for each category wth d hops, where d {, 2,..., D}. III. NETWORK ARCHITECTURE In OBS networks, there are two types of nodes: electronc edge nodes and optcal core nodes. Edge nodes are the gateways between OBS networks and tradtonal networks, such as IP networks and ATM networks. Core nodes route bursts hop-by-hop all-optcally through the OBS network. A general archtecture of edge nodes and core nodes n OBS networks was proposed n [6]. Edge nodes are responsble for burst assembly and deassembly. In burst clonng, f the clonng node s the source node (referred to as source clonng), ngress nodes are also responsble for duplcatng bursts. In source clonng, clonng can be done n the electronc doman. Wth burst clonng, egress nodes also have more work to do than just deassemblng bursts. The desgnated egress node may receve both the orgnal burst and the cloned burst. To avod sendng duplcated packets to hgher layers, the dentty number of packets may be buffered at the egress node untl a tme out occurs or the other copy s receved. Core nodes provde all-optcal routng, enablng data bursts to bypass the node. If the clonng node s an ntermedate node (referred to as ntermedate clonng), the clonng core node should have optcal splttng capablty, whch duplcates an ncomng data burst nto two or more copes. Multcast capable optcal crossconnect [7], MC-OXC, can be conered for ntermedate clonng. In general, MC-OXCs are much more expensve than regular OXCs. However, as we wll show wth our analytcal model and smulatons n the followng sectons, source clonng has the best loss performance. Hence, n our proposed scheme, we need only regular OXCs nstead of expensve MC-OXCs. Another archtectural ssue comes from the combnaton of burst segmentaton and burst clonng. One of the e-effects of burst segmentaton s that the length of the burst can decrease due to possble contentons as t travels towards the destnaton. 674

3 Hence, some packets n the data burst can be lost before they reach the destnaton. Specfcally, when a strct tal-droppng technque s adopted, the probablty of packets toward the tal beng dropped s much hgher than the packets toward the head of the burst. When combned wth burst clonng, t s very lkely that both bursts reach the destnaton but that each burst has lost a part of ts tal. In order to counter ths effect, we can reverse the order of packets n the cloned burst at the clonng node whle sendng out the orgnal burst as t s. Ths reversal of packets ensures that packets n the tal of the orgnal burst wll be n the head of the cloned burst. At the destnaton, f both burst copes are receved, even though the tal of each burst may be lost due to segmentaton, the entre burst may be recovered from these two burst copes. If the clonng node s not a source node, t may be too complex to mplement the burst reversal operaton n the optcal doman. For source clonng, we nvestgate the performance of a complete reversal polcy, under whch the packet order n the cloned burst s a complete reversal of that n the orgnal burst. At destnaton nodes, after both copes are receved or tme out, a post-process procedure wll begn. Let L 0, L and L 2 be the number of packets n the orgnal burst, n the receved prmary burst, and n the receved cloned burst, respectvely. It s easy to obtan the number of packets receved for complete reversal and wthout burst reversal as mn{l 0,L + L 2 } and mn{l,l 2 }, respectvely. If any copy of the burst s lost, we can thnk the correspondng L or L 2 to be 0. It can be seen that complete reversal can further reduce data loss compared to no reversal. IV. ANALYTICAL MODEL In ths secton, we extend the analytcal model n [5] to calculate the average packet loss probablty n burst clonng wth burst segmentaton. Interested readers are referred to [5] for the detals. Frst, let us defne the followng notaton: /µ: average burst length; K : total number of hops from the source s to the destnaton d; kl : total number of hops from the source s untl to the lnk l, along the path ; λ : burst arrval rate from source s to destnaton d; λ l : arrval rate of orgnal bursts to the lnk l on the path from source s to destnaton d; γl : arrval rate of cloned bursts to the lnk l on the path from source s to destnaton d; λ l = λ l : arrval rate of orgnal bursts to lnk l, due to all source-destnaton pars ; γ l = γ l : arrval rate of cloned bursts to lnk l, due to all source-destnaton pars ; λ l : arrval rate of all orgnal bursts on the th hop lnk of the path between source s and destnaton d. Letl = l, then λ l = λ l ; r : prmary route from source s to destnaton d; : clonng route from source s to destnaton d. r The offered load on lnk l by traffc from source s to destnaton d depends on whether lnk l s on the path from s to d. Wth segmentaton, burst length may decrease along the path from s to d. However, there s no reducton of the arrval rate of bursts. Thus, λ l = { λ, f l r 0, otherwse Followng [5], we obtan the packet loss probablty of orgnal bursts (wth hgh prorty) as Ploss0 µ = (4) K λ l + µ = and the utlzaton due to orgnal bursts on lnk l as ρ l = s,d kl = λ l λ l + µ (3). (5) Clonng traffc s treated as the same as the low prorty traffc n [5]. Thus, λ, f l r γl,l = l 0 = γh ( ρ h), f l, h r,h= l, (6) 0, otherwse. Followng [5], we obtan the packet loss probablty of cloned bursts (wth low prorty) as P loss = K = K (λ l j= ( ρ ) µ j + γ l j )+µ. (7) After we obtan the packet loss probabltes for both orgnal bursts and cloned bursts, we can calculate the endto-end packet loss probablty Ploss by Ploss = Ploss0 sc +( Ploss0) sc Ploss0 cd Ploss cd (8) where c s the clonng node of source-destnaton par. Takng the traffc weghted average of end-to-end packet loss probabltes, we obtan the average packet loss probablty for the network as P loss = λ λ P loss. (9) s d V. NUMERICAL RESULTS In ths secton, we present the numercal results from our analytcal model and smulatons. We evaluate the performance of our proposed scheme n the 4-node NSFNET as shown n Fg. 2, n whch the number on a lnk s the dstance n klometers between two adjacent nodes. Bursts arrve to the network accordng to a Posson process. Incomng traffc s evenly dstrbuted among all source-destnaton pars. Packets n a burst have a fxed length of 250 bytes. The length of a burst s exponentally dstrbuted. The lnk transmsson rate s 0 Gb/s, and the speed of lght n optcal fbers s assumed to 675

4 be 250 km/ms. There are no wavelength converters or optcal buffers n the network. TAG sgnallng protocol s assumed, wth each node equpped wth fxed FDLs to buffer data bursts whle BHPs are beng processed. To avod the effect of wavelength assgnment algorthms, we run the smulaton on one wavelength. The dameter of the 4-node NSFNET s D =3. Accordng to the proposed scheme, we dvde source-destnaton pars nto 3 categores: -hop pars, 2-hop pars, and 3-hop pars. We number the nodes along the k-hop (k =, 2, 3) path as 0,, 2,...,k. Then, we use a vector C =[c,c 2,c 3 ] to denote clonng confguratons, where c k denotes the clonng node for all k-hop source-destnaton pars. c k =0means source clonng; c k = k means no clonng; c k {, 2,...,k } means ntermedate clonng. For example, f we do clonng for all pars at the source node, we set C =[0, 0, 0]; fwe do not do clonng for any node par, we set C = [, 2, 3]. All possble clonng confguratons wth clonng confguraton ndex (denoted by I C ) are lsted n Table I. We frst study the performance of dfferent clone confguratons wthout the burst reversal operaton. Fg. 3 and Fg. 4 show the packet loss probablty wth dfferent clonng confguratons by smulaton and analyss, respectvely. In both fgures, each curve denotes the loss performance under one specfc network load, whch vares from to 64. We observe that the results for dfferent clonng confguratons are qute consstent under dfferent network loads for smulaton and for the analytcal model. Source clonng (I C = 0 wth C =[0, 0, 0]) always has the best loss performance, followed by confguraton I C = 2 (.e., C = [, 0, 0], no clonng for -hop node pars and source clonng for all other node pars). From Fg. 3 and Fg. 4, we fnd that any clonng confguraton (wth I C between [0, 22]) has better loss performance than wthout clonng (.e., I C =23wth C =[, 2, 3]). Ths performance s due to the traffc solaton mechansm and preemptve schedulng n our proposed scheme. Thus, cloned bursts do not nterfere wth orgnal bursts. Cloned bursts just try to utlze network resources whch are not occuped by orgnal bursts. It s qute nterestng to notce n Fg. 3, Fg. 4, and Fg. 5 that there are consstently 6 ncreasng segments n each curve. We fnd that these segments have clonng confguraton ndex I C as follows: {0,, 2, 3}, {4, 5, 6, 7}, {8, 9, 0, }, {2, 3, 4, 5}, {6, 7, 8, 9} and {20, 2, 22, 23}. In each segment, the four confguratons have the same settng for - hop and 2-hop node pars, whle the clonng node for 3-hop pars moves further and further from the source node. The further the clonng node s from the source, the less chance that the burst s cloned. Fg. 5 and Fg. 6 compare the loss performance of the analytcal model wth that of the smulatons. We can see that the analytcal model s qute accurate. Fg. 5 emphaszes the loss performance wth dfferent clonng confguratons under a fxed network load (). Under other network loads, there s smlar relatve performance. Fg. 6 gves a global vew of Fg. 3. Fg Fg node NSFNET wth dstance n klometers TABLE I NUMBERING THE CLONE CONFIGURATIONS I C C I C C I C C 0 [0,0,0] 8 [0,2,0] 6 [,,0] [0,0,] 9 [0,2,] 7 [,,] 2 [0,0,2] 0 [0,2,2] 8 [,,2] 3 [0,0,3] [0,2,3] 9 [,,3] 4 [0,,0] 2 [,0,0] 20 [,2,0] 5 [0,,] 3 [,0,] 2 [,2,] 6 [0,,2] 4 [,0,2] 22 [,2,2] 7 [0,,3] 5 [,0,3] 23 [,2,3] smu Clonng Confguraton Packet loss vs. clone confguratons under load (-64) (Smulaton) anal Clonng Confguraton Packet loss vs. clone confguratons under load (-64) (Analytcal)

5 anal smu 0 Clonng Confguraton No Clonng Source clonng - No Reversal Source clonng - Complete Reversal Fg. 5. Packet loss vs. clone load () Fg. 7. Packet loss comparson of burst reversal scheme No Clonng (anal) No Clonng (smu) Source Clonng (anal) Source Clonng (smu) Average Physcal Hops No Clonng Source clonng - No Reversal Source clonng - Complete Reversal Fg. 6. Packet loss vs. network load (-) Fg. 8. Average physcal hop comparson of burst reversal scheme source clonng under dfferent network loads (-). Fg. 6 clearly shows agan, from another pont of vew, that source clonng can sgnfcantly mprove the loss performance. We also study the performance of burst reversal. Snce we fnd that source clonng has the best loss performance among all possble clonng confguratons, we wll focus on source clonng wth burst reversal. From Fg. 7, we observe that complete reversal can sgnfcantly reduce data loss. Fg. 8 shows that burst clonng results n a small ncrease n the average number of packet hops than wthout clonng. Wth burst clonng, some otherwse lost packets wll arrve at the destnaton n the cloned burst. Between any node par, cloned bursts undergo a greater number of hops than orgnal bursts. Thus, bursts have a greater number of hops wth burst clonng than wthout burst clonng. For the same reason, complete reversal results n more packets n the cloned burst reachng the destnaton compared to clonng wthout burst reversal. Thus, complete reversal also results n more hops. However, the ncrease n hops s not sgnfcant. VI. CONCLUSIONS Ths paper addresses the ssue of data loss n OBS networks due to burst contenton. A new proactve scheme, called burst clonng, was proposed, and an analytcal model was developed to calculate the packet loss probablty. Extensve smulatons verfed the analytcal model and showed that burst clonng can sgnfcantly mprove the loss performance wthout sgnfcant ncrease n packet delay. REFERENCES [] C. Qao and M. Yoo, Optcal Burst Swtchng (OBS) - A New Paradgm for an Optcal Internet, Journal of Hgh Speed Networks, vol. 8, no., pp , Jan [2] B. Ramamurthy and B. Mukherjee, Wavelength Converson n WDM Networkng, IEEE Journal on Selected Areas n Communcatons, vol. 6, no. 7, pp , Sept [3] C. Gauger, Dmensonng of FDL Buffers for Optcal Burst Swtchng Nodes, Proceedngs, Optcal Network Desgn and Modelng (ONDM 2002), Torno, Feb [4] C. Hsu, T. Lu, and N. Huang, Performance Analyss of Deflecton Routng n Optcal Burst Swtched Networks, Proceedngs, IEEE INFOCOM 2002, vol., Jun [5] V. M. Vokkarane and J. P. Jue, Prortzed Burst Segmentaton and Composte Burst Assembly Technques for QoS Support n Optcal Burst- Swtched Networks, IEEE Journal of Selected Areas of Communcatons, vol. 2, no. 7, pp , Sept [6] Y. Xong, M. Vandenhoute, and H. Cankaya, Control Archtecture n Optcal Burst-Swtched WDM Networks, IEEE Journal of Selected Areas of Communcatons, Vol. 8, No. 0, pp , Oct [7] W.S. Hu and Q.J. Zeng, Multcastng optcal cross connects employng spltter-and-delvery swtch, IEEE Photoncs Technology Letters, vol. 0, no. 7, pp , Jul

Analysis of Queuing Delay in Multimedia Gateway Call Routing

Analysis of Queuing Delay in Multimedia Gateway Call Routing Analyss of Queung Delay n Multmeda ateway Call Routng Qwe Huang UTtarcom Inc, 33 Wood Ave. outh Iseln, NJ 08830, U..A Errol Lloyd Computer Informaton cences Department, Unv. of Delaware, Newark, DE 976,

More information

Lecture 4: November 17, Part 1 Single Buffer Management

Lecture 4: November 17, Part 1 Single Buffer Management Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input

More information

Queueing Networks II Network Performance

Queueing Networks II Network Performance Queueng Networks II Network Performance Davd Tpper Assocate Professor Graduate Telecommuncatons and Networkng Program Unversty of Pttsburgh Sldes 6 Networks of Queues Many communcaton systems must be modeled

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling Real-Tme Systems Multprocessor schedulng Specfcaton Implementaton Verfcaton Multprocessor schedulng -- -- Global schedulng How are tasks assgned to processors? Statc assgnment The processor(s) used for

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

The optimal delay of the second test is therefore approximately 210 hours earlier than =2.

The optimal delay of the second test is therefore approximately 210 hours earlier than =2. THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple

More information

TCOM 501: Networking Theory & Fundamentals. Lecture 7 February 25, 2003 Prof. Yannis A. Korilis

TCOM 501: Networking Theory & Fundamentals. Lecture 7 February 25, 2003 Prof. Yannis A. Korilis TCOM 501: Networkng Theory & Fundamentals Lecture 7 February 25, 2003 Prof. Yanns A. Korls 1 7-2 Topcs Open Jackson Networks Network Flows State-Dependent Servce Rates Networks of Transmsson Lnes Klenrock

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

Effects of bursty traffic in service differentiated Optical Packet Switched networks

Effects of bursty traffic in service differentiated Optical Packet Switched networks Effects of bursty traffc n servce dfferentated Optcal Packet Swtched networks Harald Øverby, orvald Stol Department of Telematcs, orwegan Unversty of Scence and Technology, O.S. Bragstadsplass E, -749

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

Assortment Optimization under MNL

Assortment Optimization under MNL Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

System in Weibull Distribution

System in Weibull Distribution Internatonal Matheatcal Foru 4 9 no. 9 94-95 Relablty Equvalence Factors of a Seres-Parallel Syste n Webull Dstrbuton M. A. El-Dacese Matheatcs Departent Faculty of Scence Tanta Unversty Tanta Egypt eldacese@yahoo.co

More information

COMPLETE BUFFER SHARING IN ATM NETWORKS UNDER BURSTY ARRIVALS

COMPLETE BUFFER SHARING IN ATM NETWORKS UNDER BURSTY ARRIVALS COMPLETE BUFFER SHARING WITH PUSHOUT THRESHOLDS IN ATM NETWORKS UNDER BURSTY ARRIVALS Ozgur Aras and Tugrul Dayar Abstract. Broadband Integrated Servces Dgtal Networks (B{ISDNs) are to support multple

More information

Finding Dense Subgraphs in G(n, 1/2)

Finding Dense Subgraphs in G(n, 1/2) Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng

More information

WASHINGTON UNIVERSITY THE HENRY EDWIN SEVER GRADUATE SCHOOL DEPARTMENT OF ELECTRICAL ENGINEERING DESIGN OF OPTICAL BURST SWITCHING SYSTEMS.

WASHINGTON UNIVERSITY THE HENRY EDWIN SEVER GRADUATE SCHOOL DEPARTMENT OF ELECTRICAL ENGINEERING DESIGN OF OPTICAL BURST SWITCHING SYSTEMS. WASHINGTON UNIVERSITY THE HENRY EDWIN SEVER GRADUATE SCHOOL DEPARTMENT OF ELECTRICAL ENGINEERING DESIGN OF OPTICAL BURST SWITCHING SYSTEMS By Yuhua Chen Prepared under the drecton of Professor Jonathan

More information

Outline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1]

Outline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1] DYNAMIC SHORTEST PATH SEARCH AND SYNCHRONIZED TASK SWITCHING Jay Wagenpfel, Adran Trachte 2 Outlne Shortest Communcaton Path Searchng Bellmann Ford algorthm Algorthm for dynamc case Modfcatons to our algorthm

More information

Opportunistic Weighted Fair Queueing

Opportunistic Weighted Fair Queueing Opportunstc Weghted Far Queueng Knda Khawam, Danel Kofman GET/ENST Telecom Pars Emal: {khawam, kofman}@enst.fr Abstract The ongong evoluton towards the generalzaton of wreless access to mult-servce networks

More information

Bayesian predictive Configural Frequency Analysis

Bayesian predictive Configural Frequency Analysis Psychologcal Test and Assessment Modelng, Volume 54, 2012 (3), 285-292 Bayesan predctve Confgural Frequency Analyss Eduardo Gutérrez-Peña 1 Abstract Confgural Frequency Analyss s a method for cell-wse

More information

Assignment 5. Simulation for Logistics. Monti, N.E. Yunita, T.

Assignment 5. Simulation for Logistics. Monti, N.E. Yunita, T. Assgnment 5 Smulaton for Logstcs Mont, N.E. Yunta, T. November 26, 2007 1. Smulaton Desgn The frst objectve of ths assgnment s to derve a 90% two-sded Confdence Interval (CI) for the average watng tme

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

A Robust Method for Calculating the Correlation Coefficient

A Robust Method for Calculating the Correlation Coefficient A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal

More information

Pricing and Resource Allocation Game Theoretic Models

Pricing and Resource Allocation Game Theoretic Models Prcng and Resource Allocaton Game Theoretc Models Zhy Huang Changbn Lu Q Zhang Computer and Informaton Scence December 8, 2009 Z. Huang, C. Lu, and Q. Zhang (CIS) Game Theoretc Models December 8, 2009

More information

Lecture Randomized Load Balancing strategies and their analysis. Probability concepts include, counting, the union bound, and Chernoff bounds.

Lecture Randomized Load Balancing strategies and their analysis. Probability concepts include, counting, the union bound, and Chernoff bounds. U.C. Berkeley CS273: Parallel and Dstrbuted Theory Lecture 1 Professor Satsh Rao August 26, 2010 Lecturer: Satsh Rao Last revsed September 2, 2010 Lecture 1 1 Course Outlne We wll cover a samplng of the

More information

We present the algorithm first, then derive it later. Assume access to a dataset {(x i, y i )} n i=1, where x i R d and y i { 1, 1}.

We present the algorithm first, then derive it later. Assume access to a dataset {(x i, y i )} n i=1, where x i R d and y i { 1, 1}. CS 189 Introducton to Machne Learnng Sprng 2018 Note 26 1 Boostng We have seen that n the case of random forests, combnng many mperfect models can produce a snglodel that works very well. Ths s the dea

More information

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal

More information

Concepts for Wireless Ad Hoc

Concepts for Wireless Ad Hoc Bandwdth and Avalable Bandwdth oncepts for Wreless Ad Hoc Networks Marco A. Alzate Unversdad Dstrtal, Bogotá Néstor M. Peña Unversdad de los Andes, Bogotá Mguel A. abrador Unversty of South Florda, Tampa

More information

Markov Chain Monte Carlo Lecture 6

Markov Chain Monte Carlo Lecture 6 where (x 1,..., x N ) X N, N s called the populaton sze, f(x) f (x) for at least one {1, 2,..., N}, and those dfferent from f(x) are called the tral dstrbutons n terms of mportance samplng. Dfferent ways

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

O-line Temporary Tasks Assignment. Abstract. In this paper we consider the temporary tasks assignment

O-line Temporary Tasks Assignment. Abstract. In this paper we consider the temporary tasks assignment O-lne Temporary Tasks Assgnment Yoss Azar and Oded Regev Dept. of Computer Scence, Tel-Avv Unversty, Tel-Avv, 69978, Israel. azar@math.tau.ac.l??? Dept. of Computer Scence, Tel-Avv Unversty, Tel-Avv, 69978,

More information

Suppose that there s a measured wndow of data fff k () ; :::; ff k g of a sze w, measured dscretely wth varable dscretzaton step. It s convenent to pl

Suppose that there s a measured wndow of data fff k () ; :::; ff k g of a sze w, measured dscretely wth varable dscretzaton step. It s convenent to pl RECURSIVE SPLINE INTERPOLATION METHOD FOR REAL TIME ENGINE CONTROL APPLICATIONS A. Stotsky Volvo Car Corporaton Engne Desgn and Development Dept. 97542, HA1N, SE- 405 31 Gothenburg Sweden. Emal: astotsky@volvocars.com

More information

Boostrapaggregating (Bagging)

Boostrapaggregating (Bagging) Boostrapaggregatng (Baggng) An ensemble meta-algorthm desgned to mprove the stablty and accuracy of machne learnng algorthms Can be used n both regresson and classfcaton Reduces varance and helps to avod

More information

Appendix B: Resampling Algorithms

Appendix B: Resampling Algorithms 407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

Homework Assignment 3 Due in class, Thursday October 15

Homework Assignment 3 Due in class, Thursday October 15 Homework Assgnment 3 Due n class, Thursday October 15 SDS 383C Statstcal Modelng I 1 Rdge regresson and Lasso 1. Get the Prostrate cancer data from http://statweb.stanford.edu/~tbs/elemstatlearn/ datasets/prostate.data.

More information

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U)

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U) Econ 413 Exam 13 H ANSWERS Settet er nndelt 9 deloppgaver, A,B,C, som alle anbefales å telle lkt for å gøre det ltt lettere å stå. Svar er gtt . Unfortunately, there s a prntng error n the hnt of

More information

An Optimization Model for Routing in Low Earth Orbit Satellite Constellations

An Optimization Model for Routing in Low Earth Orbit Satellite Constellations An Optmzaton Model for Routng n Low Earth Orbt Satellte Constellatons A. Ferrera J. Galter P. Mahey Inra Inra Inra Afonso.Ferrera@sopha.nra.fr Jerome.Galter@nra.fr Phlppe.Mahey@sma.fr G. Mateus A. Olvera

More information

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification

Department of Electrical & Electronic Engineeing Imperial College London. E4.20 Digital IC Design. Median Filter Project Specification Desgn Project Specfcaton Medan Flter Department of Electrcal & Electronc Engneeng Imperal College London E4.20 Dgtal IC Desgn Medan Flter Project Specfcaton A medan flter s used to remove nose from a sampled

More information

Using non-preemptive regions and path modification to improve schedulability of real-time traffic over priority-based NoCs

Using non-preemptive regions and path modification to improve schedulability of real-time traffic over priority-based NoCs Real-Tme Syst (2017) 53:886 915 DOI 10.1007/s11241-017-9276-5 Usng non-preemptve regons and path modfcaton to mprove schedulablty of real-tme traffc over prorty-based NoCs Meng Lu 1 Matthas Becker 1 Mors

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

Single-Facility Scheduling over Long Time Horizons by Logic-based Benders Decomposition

Single-Facility Scheduling over Long Time Horizons by Logic-based Benders Decomposition Sngle-Faclty Schedulng over Long Tme Horzons by Logc-based Benders Decomposton Elvn Coban and J. N. Hooker Tepper School of Busness, Carnege Mellon Unversty ecoban@andrew.cmu.edu, john@hooker.tepper.cmu.edu

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

arxiv:cs.cv/ Jun 2000

arxiv:cs.cv/ Jun 2000 Correlaton over Decomposed Sgnals: A Non-Lnear Approach to Fast and Effectve Sequences Comparson Lucano da Fontoura Costa arxv:cs.cv/0006040 28 Jun 2000 Cybernetc Vson Research Group IFSC Unversty of São

More information

Complement of Type-2 Fuzzy Shortest Path Using Possibility Measure

Complement of Type-2 Fuzzy Shortest Path Using Possibility Measure Intern. J. Fuzzy Mathematcal rchve Vol. 5, No., 04, 9-7 ISSN: 30 34 (P, 30 350 (onlne Publshed on 5 November 04 www.researchmathsc.org Internatonal Journal of Complement of Type- Fuzzy Shortest Path Usng

More information

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,

More information

A Hybrid Variational Iteration Method for Blasius Equation

A Hybrid Variational Iteration Method for Blasius Equation Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method

More information

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,

More information

THE ROYAL STATISTICAL SOCIETY 2006 EXAMINATIONS SOLUTIONS HIGHER CERTIFICATE

THE ROYAL STATISTICAL SOCIETY 2006 EXAMINATIONS SOLUTIONS HIGHER CERTIFICATE THE ROYAL STATISTICAL SOCIETY 6 EXAMINATIONS SOLUTIONS HIGHER CERTIFICATE PAPER I STATISTICAL THEORY The Socety provdes these solutons to assst canddates preparng for the eamnatons n future years and for

More information

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results. Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson

More information

Lecture 8: Time & Clocks. CDK: Sections TVS: Sections

Lecture 8: Time & Clocks. CDK: Sections TVS: Sections Lecture 8: Tme & Clocks CDK: Sectons 11.1 11.4 TVS: Sectons 6.1 6.2 Topcs Synchronzaton Logcal tme (Lamport) Vector clocks We assume there are benefts from havng dfferent systems n a network able to agree

More information

Lecture 4. Instructor: Haipeng Luo

Lecture 4. Instructor: Haipeng Luo Lecture 4 Instructor: Hapeng Luo In the followng lectures, we focus on the expert problem and study more adaptve algorthms. Although Hedge s proven to be worst-case optmal, one may wonder how well t would

More information

On the Multicriteria Integer Network Flow Problem

On the Multicriteria Integer Network Flow Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of

More information

COMPOSITE BEAM WITH WEAK SHEAR CONNECTION SUBJECTED TO THERMAL LOAD

COMPOSITE BEAM WITH WEAK SHEAR CONNECTION SUBJECTED TO THERMAL LOAD COMPOSITE BEAM WITH WEAK SHEAR CONNECTION SUBJECTED TO THERMAL LOAD Ákos Jósef Lengyel, István Ecsed Assstant Lecturer, Professor of Mechancs, Insttute of Appled Mechancs, Unversty of Mskolc, Mskolc-Egyetemváros,

More information

Last Time. Priority-based scheduling. Schedulable utilization Rate monotonic rule: Keep utilization below 69% Static priorities Dynamic priorities

Last Time. Priority-based scheduling. Schedulable utilization Rate monotonic rule: Keep utilization below 69% Static priorities Dynamic priorities Last Tme Prorty-based schedulng Statc prortes Dynamc prortes Schedulable utlzaton Rate monotonc rule: Keep utlzaton below 69% Today Response tme analyss Blockng terms Prorty nverson And solutons Release

More information

Lecture 12: Discrete Laplacian

Lecture 12: Discrete Laplacian Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly

More information

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION

CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING INTRODUCTION CONTRAST ENHANCEMENT FOR MIMIMUM MEAN BRIGHTNESS ERROR FROM HISTOGRAM PARTITIONING N. Phanthuna 1,2, F. Cheevasuvt 2 and S. Chtwong 2 1 Department of Electrcal Engneerng, Faculty of Engneerng Rajamangala

More information

BOOTSTRAP METHOD FOR TESTING OF EQUALITY OF SEVERAL MEANS. M. Krishna Reddy, B. Naveen Kumar and Y. Ramu

BOOTSTRAP METHOD FOR TESTING OF EQUALITY OF SEVERAL MEANS. M. Krishna Reddy, B. Naveen Kumar and Y. Ramu BOOTSTRAP METHOD FOR TESTING OF EQUALITY OF SEVERAL MEANS M. Krshna Reddy, B. Naveen Kumar and Y. Ramu Department of Statstcs, Osmana Unversty, Hyderabad -500 007, Inda. nanbyrozu@gmal.com, ramu0@gmal.com

More information

Multiple Sound Source Location in 3D Space with a Synchronized Neural System

Multiple Sound Source Location in 3D Space with a Synchronized Neural System Multple Sound Source Locaton n D Space wth a Synchronzed Neural System Yum Takzawa and Atsush Fukasawa Insttute of Statstcal Mathematcs Research Organzaton of Informaton and Systems 0- Mdor-cho, Tachkawa,

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

Temperature. Chapter Heat Engine

Temperature. Chapter Heat Engine Chapter 3 Temperature In prevous chapters of these notes we ntroduced the Prncple of Maxmum ntropy as a technque for estmatng probablty dstrbutons consstent wth constrants. In Chapter 9 we dscussed the

More information

UNIVERSITY OF TORONTO Faculty of Arts and Science. December 2005 Examinations STA437H1F/STA1005HF. Duration - 3 hours

UNIVERSITY OF TORONTO Faculty of Arts and Science. December 2005 Examinations STA437H1F/STA1005HF. Duration - 3 hours UNIVERSITY OF TORONTO Faculty of Arts and Scence December 005 Examnatons STA47HF/STA005HF Duraton - hours AIDS ALLOWED: (to be suppled by the student) Non-programmable calculator One handwrtten 8.5'' x

More information

The Geometry of Logit and Probit

The Geometry of Logit and Probit The Geometry of Logt and Probt Ths short note s meant as a supplement to Chapters and 3 of Spatal Models of Parlamentary Votng and the notaton and reference to fgures n the text below s to those two chapters.

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

A LINEAR PROGRAM TO COMPARE MULTIPLE GROSS CREDIT LOSS FORECASTS. Dr. Derald E. Wentzien, Wesley College, (302) ,

A LINEAR PROGRAM TO COMPARE MULTIPLE GROSS CREDIT LOSS FORECASTS. Dr. Derald E. Wentzien, Wesley College, (302) , A LINEAR PROGRAM TO COMPARE MULTIPLE GROSS CREDIT LOSS FORECASTS Dr. Derald E. Wentzen, Wesley College, (302) 736-2574, wentzde@wesley.edu ABSTRACT A lnear programmng model s developed and used to compare

More information

FUZZY GOAL PROGRAMMING VS ORDINARY FUZZY PROGRAMMING APPROACH FOR MULTI OBJECTIVE PROGRAMMING PROBLEM

FUZZY GOAL PROGRAMMING VS ORDINARY FUZZY PROGRAMMING APPROACH FOR MULTI OBJECTIVE PROGRAMMING PROBLEM Internatonal Conference on Ceramcs, Bkaner, Inda Internatonal Journal of Modern Physcs: Conference Seres Vol. 22 (2013) 757 761 World Scentfc Publshng Company DOI: 10.1142/S2010194513010982 FUZZY GOAL

More information

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,

More information

Lecture 10 Support Vector Machines II

Lecture 10 Support Vector Machines II Lecture 10 Support Vector Machnes II 22 February 2016 Taylor B. Arnold Yale Statstcs STAT 365/665 1/28 Notes: Problem 3 s posted and due ths upcomng Frday There was an early bug n the fake-test data; fxed

More information

CS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016

CS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016 CS 29-128: Algorthms and Uncertanty Lecture 17 Date: October 26, 2016 Instructor: Nkhl Bansal Scrbe: Mchael Denns 1 Introducton In ths lecture we wll be lookng nto the secretary problem, and an nterestng

More information

One-sided finite-difference approximations suitable for use with Richardson extrapolation

One-sided finite-difference approximations suitable for use with Richardson extrapolation Journal of Computatonal Physcs 219 (2006) 13 20 Short note One-sded fnte-dfference approxmatons sutable for use wth Rchardson extrapolaton Kumar Rahul, S.N. Bhattacharyya * Department of Mechancal Engneerng,

More information

Chapter - 2. Distribution System Power Flow Analysis

Chapter - 2. Distribution System Power Flow Analysis Chapter - 2 Dstrbuton System Power Flow Analyss CHAPTER - 2 Radal Dstrbuton System Load Flow 2.1 Introducton Load flow s an mportant tool [66] for analyzng electrcal power system network performance. Load

More information

Numerical Heat and Mass Transfer

Numerical Heat and Mass Transfer Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and

More information

Copyright 2017 by Taylor Enterprises, Inc., All Rights Reserved. Adjusted Control Limits for U Charts. Dr. Wayne A. Taylor

Copyright 2017 by Taylor Enterprises, Inc., All Rights Reserved. Adjusted Control Limits for U Charts. Dr. Wayne A. Taylor Taylor Enterprses, Inc. Adjusted Control Lmts for U Charts Copyrght 207 by Taylor Enterprses, Inc., All Rghts Reserved. Adjusted Control Lmts for U Charts Dr. Wayne A. Taylor Abstract: U charts are used

More information

Asynchronous CSMA Policies in Multihop Wireless Networks with Primary Interference Constraints

Asynchronous CSMA Policies in Multihop Wireless Networks with Primary Interference Constraints Asynchronous CSMA Polces n Multhop Wreless Networks wth Prmary Interference Constrants Peter Marbach, Atlla Erylmaz, and Asu Ozdaglar Abstract We analyze Asynchronous Carrer Sense Multple Access (CSMA)

More information

Hashing. Alexandra Stefan

Hashing. Alexandra Stefan Hashng Alexandra Stefan 1 Hash tables Tables Drect access table (or key-ndex table): key => ndex Hash table: key => hash value => ndex Man components Hash functon Collson resoluton Dfferent keys mapped

More information

HMMT February 2016 February 20, 2016

HMMT February 2016 February 20, 2016 HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,

More information

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve

More information

Embedded Systems. 4. Aperiodic and Periodic Tasks

Embedded Systems. 4. Aperiodic and Periodic Tasks Embedded Systems 4. Aperodc and Perodc Tasks Lothar Thele 4-1 Contents of Course 1. Embedded Systems Introducton 2. Software Introducton 7. System Components 10. Models 3. Real-Tme Models 4. Perodc/Aperodc

More information

Interactive Bi-Level Multi-Objective Integer. Non-linear Programming Problem

Interactive Bi-Level Multi-Objective Integer. Non-linear Programming Problem Appled Mathematcal Scences Vol 5 0 no 65 3 33 Interactve B-Level Mult-Objectve Integer Non-lnear Programmng Problem O E Emam Department of Informaton Systems aculty of Computer Scence and nformaton Helwan

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

Average Decision Threshold of CA CFAR and excision CFAR Detectors in the Presence of Strong Pulse Jamming 1

Average Decision Threshold of CA CFAR and excision CFAR Detectors in the Presence of Strong Pulse Jamming 1 Average Decson hreshold of CA CFAR and excson CFAR Detectors n the Presence of Strong Pulse Jammng Ivan G. Garvanov and Chrsto A. Kabachev Insttute of Informaton echnologes Bulgaran Academy of Scences

More information

Novel Pre-Compression Rate-Distortion Optimization Algorithm for JPEG 2000

Novel Pre-Compression Rate-Distortion Optimization Algorithm for JPEG 2000 Novel Pre-Compresson Rate-Dstorton Optmzaton Algorthm for JPEG 2000 Yu-We Chang, Hung-Ch Fang, Chung-Jr Lan, and Lang-Gee Chen DSP/IC Desgn Laboratory, Graduate Insttute of Electroncs Engneerng Natonal

More information

The L(2, 1)-Labeling on -Product of Graphs

The L(2, 1)-Labeling on -Product of Graphs Annals of Pure and Appled Mathematcs Vol 0, No, 05, 9-39 ISSN: 79-087X (P, 79-0888(onlne Publshed on 7 Aprl 05 wwwresearchmathscorg Annals of The L(, -Labelng on -Product of Graphs P Pradhan and Kamesh

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

EEL 6266 Power System Operation and Control. Chapter 3 Economic Dispatch Using Dynamic Programming

EEL 6266 Power System Operation and Control. Chapter 3 Economic Dispatch Using Dynamic Programming EEL 6266 Power System Operaton and Control Chapter 3 Economc Dspatch Usng Dynamc Programmng Pecewse Lnear Cost Functons Common practce many utltes prefer to represent ther generator cost functons as sngle-

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests

Simulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests Smulated of the Cramér-von Mses Goodness-of-Ft Tests Steele, M., Chaselng, J. and 3 Hurst, C. School of Mathematcal and Physcal Scences, James Cook Unversty, Australan School of Envronmental Studes, Grffth

More information

CS 798: Homework Assignment 2 (Probability)

CS 798: Homework Assignment 2 (Probability) 0 Sample space Assgned: September 30, 2009 In the IEEE 802 protocol, the congeston wndow (CW) parameter s used as follows: ntally, a termnal wats for a random tme perod (called backoff) chosen n the range

More information

Distributed Optimal TXOP Control for Throughput Requirements in IEEE e Wireless LAN

Distributed Optimal TXOP Control for Throughput Requirements in IEEE e Wireless LAN Dstrbuted Optmal TXOP Control for Throughput Requrements n IEEE 80.e Wreless LAN Ju Yong Lee, Ho Young Hwang, Jtae Shn, and Shahrokh Valaee KAIST Insttute for Informaton Technology Convergence, KAIST,

More information

Credit Card Pricing and Impact of Adverse Selection

Credit Card Pricing and Impact of Adverse Selection Credt Card Prcng and Impact of Adverse Selecton Bo Huang and Lyn C. Thomas Unversty of Southampton Contents Background Aucton model of credt card solctaton - Errors n probablty of beng Good - Errors n

More information

Application of Queuing Theory to Waiting Time of Out-Patients in Hospitals.

Application of Queuing Theory to Waiting Time of Out-Patients in Hospitals. Applcaton of Queung Theory to Watng Tme of Out-Patents n Hosptals. R.A. Adeleke *, O.D. Ogunwale, and O.Y. Hald. Department of Mathematcal Scences, Unversty of Ado-Ekt, Ado-Ekt, Ekt State, Ngera. E-mal:

More information

A Note on Bound for Jensen-Shannon Divergence by Jeffreys

A Note on Bound for Jensen-Shannon Divergence by Jeffreys OPEN ACCESS Conference Proceedngs Paper Entropy www.scforum.net/conference/ecea- A Note on Bound for Jensen-Shannon Dvergence by Jeffreys Takuya Yamano, * Department of Mathematcs and Physcs, Faculty of

More information

FEATURE ANALYSIS ON QUEUE LENGTH OF ASYMMETRIC TWO-QUEUE POLLING SYSTEM WITH GATED SERVICES *

FEATURE ANALYSIS ON QUEUE LENGTH OF ASYMMETRIC TWO-QUEUE POLLING SYSTEM WITH GATED SERVICES * Journal of Theoretcal and Appled Informaton Technoloy 0 th January 03. Vol. 4 No. 005-03 JATIT & LLS. All rhts reserved. ISSN: 99-845 www.att.or E-ISSN: 8-395 FEATURE ANALYSIS ON QUEUE LENGTH OF ASYMMETRIC

More information

Fuzzy Boundaries of Sample Selection Model

Fuzzy Boundaries of Sample Selection Model Proceedngs of the 9th WSES Internatonal Conference on ppled Mathematcs, Istanbul, Turkey, May 7-9, 006 (pp309-34) Fuzzy Boundares of Sample Selecton Model L. MUHMD SFIIH, NTON BDULBSH KMIL, M. T. BU OSMN

More information

Operating conditions of a mine fan under conditions of variable resistance

Operating conditions of a mine fan under conditions of variable resistance Paper No. 11 ISMS 216 Operatng condtons of a mne fan under condtons of varable resstance Zhang Ynghua a, Chen L a, b, Huang Zhan a, *, Gao Yukun a a State Key Laboratory of Hgh-Effcent Mnng and Safety

More information

A Lower Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control

A Lower Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control A ower Bound on SIR Threshold for Call Admsson Control n Multple-Class CDMA Systems w Imperfect ower-control Mohamed H. Ahmed Faculty of Engneerng and Appled Scence Memoral Unversty of ewfoundland St.

More information

CS-433: Simulation and Modeling Modeling and Probability Review

CS-433: Simulation and Modeling Modeling and Probability Review CS-433: Smulaton and Modelng Modelng and Probablty Revew Exercse 1. (Probablty of Smple Events) Exercse 1.1 The owner of a camera shop receves a shpment of fve cameras from a camera manufacturer. Unknown

More information