Shadow Computing: An Energy-Aware Fault Tolerant Computing Model
|
|
- Blaise Edwards
- 5 years ago
- Views:
Transcription
1 Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, Index Terms shadow comuting, fault tolerance, scheduling, resiliency Abstract The current resonse to fault tolerance relies uon either time or hardware redundancy in order to mask faults. Time redundancy imlies a re-execution of the failed comutation after the failure has been detected, although this can further be otimized by the use of checkoints these solutions still imose a significant delay. In many mission critical systems hardware redundancy has traditionally deloyed in the form of rocess relication to rovide fault tolerance, avoiding delay and maintaining tight deadlines. Both aroaches have drawbacks, re-execution requiring additional time and relication requiring additional resources, esecially energy. This forces the systems engineer to choose between time or hardware redundancy, cloud comuting environments have largely chosen relication because resonse time is often critical. In this aer we roose a new comutational model called shadow comuting, which rovides goal-based adative resilience through the use of dynamic execution. Using this general model we develo shadow relication which enables a arameterized tradeoff between time and hardware redundancy to rovide fault tolerance. Then we build an analytical model to redict the exected energy savings and rovide an analysis using that model. I. INTRODUCTION Power consumtion is widely recognized as one of the most significant challenges facing data centers in both cloud comuting and high erformance comuting (HPC) [5], [1]. Addressing such a challenge requires building ower and energy awareness into the foundations of future comuting models. New aroaches must be develoed to achieve efficient energy management across all hardware and software comonents of the system. The increase in energy consumtion is a direct result of an increase in the number of comuting nodes, conversely this has an equally negative effect on the overall system reliability. Even if the individual node failure rate is low, the overall system failure rate quickly becomes unaccetable as the number of comonents increases. For examle, a comuting system with 200,000 nodes will exerience a mean time between failure (MTBF) of less than one hour, even when the MTBF of an individual node is 5 years [3]. Future systems will clearly need to be fault tolerant and at the same time be energy-aware. This work is suorted in art by NSF grants CNS and CNS The common resonse to faults is to restart the execution of the alication after a failure, including those comonents of its software environment that have been affected by the occurring fault. Re-execution techniques can occur at different oints of the alication, ossibly involving the comlete reexecution of the task although usually a checkoint is used to reduce the amount of rework necessary. In either case the reexecution will cause a delay. To avoid this delay most cloud environments have chosen rocess relication [6], [8], [4] to mask faults removing the delay of re-execution. It is clear that while relication rovides a method of achieving fault tolerance it is not energy efficient because, by its very nature, it costs twice as much as a single rocess. The main objective of this aer is to exlore a new comutational model called shadow comuting by develoing an energy-aware fault-tolerance method called shadow relication. We show that this method not only rovides fault tolerance but can rovide energy savings of 15-30% in existing systems. A. Shadow Comuting We are roosing a new comutational model, called shadow comuting, which rovides goal-based adative resilience using dynamic execution to meet the requirements of comlex alications in highly arallelized faulty environments. Adative Resilience is the ability of the system to dynamically harness all available resources to achieve the highest level of QoS for a given alication. Dynamic execution is the ability to execute an alication while being able to change the QoS of that alication. For examle, in this aer we exloit the ability to execute rocesses at variable execution seeds using dynamic voltage and frequency scaling (DVFS), changing the QoS of alication resonse time. The challenge is to maintain or exceed the alications QoS while minimizing the system resources in site of systems-level changes, such as failures or the availability of additional system resources. In order to achieve adative resilience, the shadow comuting model associates a set of shadows to the main execution, which are dynamically instantiated and adjusted in order to address the current state of the system and maintain the alication s QoS requirements. The objective of this aer is to balance the system resource of ower with the QoS of alication resonse time in the resence
2 of system faults. To this end, we roose shadow relication which is the ability of the system to adatively execute either entirely or artially the original task to overcome failures, while minimizing system ower. B. Shadow Relication The basic idea of shadow relication is to associate with each rocess a suite of shadow rocesses, whose size deends on the criticality and erformance requirements of the underlying alication. A shadow rocess is an exact relica of the main rocess. In order to overcome failure, the shadow is scheduled to execute concurrently with the main rocess, but at a different comuting node. Furthermore, in order to minimize energy, shadow rocesses initially execute at decreasingly lower rocessor seeds. The successful comletion of the main rocess results in the immediate termination of all shadow rocesses. If the main rocess fails, however, the rimary shadow rocess immediately takes over the role of the main rocess and resumes comutation, ossibly at an increased seed, in order to comlete the task. Moreover, one among the remaining shadow rocesses is then romoted to be the rimary shadow rocess. The main challenge in realizing the otential of the shadow relication stems from the need to comute the seed of execution of the main rocess and the seed of execution of its associated shadows, both before and after a failure occurs, so that the target resonse time is met, while minimizing energy consumtion. Since the failure of an individual comonent is much lower than the aggregate system failure, it is very likely that most of the time the main rocesses comlete their execution successfully. Successful comletion of a main rocess automatically results in the immediate halting of its associated shadow rocesses, roviding a significant savings in energy consumtion. Furthermore, the number of shadow rocesses to be instantiated in order to achieve the desired level of faulttolerance must be determined based on the likelihood that more than one rocess fails within the execution time interval of the main task. The comletion of a main or its shadow results in the successful execution of the underlying task. The main contributions of this aer are threefold. First, we resent an otimization framework to exlore the alicability of the shadow relication to rovide fault-tolerance in an energy efficient manner. Second, using the otimization framework, we roose and study two imlementation methods of the shadow relication model. The first method, referred to as stretched relication, takes the trivial aroach to minimizing energy by reducing the seed of execution of both the main and the relica such that the task deadline is maintained. Although simle to imlement, stretched relication is oblivious to the dynamics of the failure, otentially resulting in sub-otimal energy erformance. The second method, referred to as energy efficient relication, comutes energy efficient execution seeds which maintain the exected resonse time regardless of failure rates. Third, we conduct a erformance evaluation to assess the erformance of shadow relication, comaring the energy consumtion of shadow relication to that of traditional relication. II. ENERGY OPTIMIZATION MODEL In this section, we define a framework for evaluating shadow relication and then use this to derive a model for reresenting the exected energy consumed by the system. A. Shadow Relication Framework We consider a distributed comuting environment executing an alication carried out by a large number of collaborative tasks. The successful execution of the alication deends on the successful comletion of all of these tasks. Therefore the failure of a single rocess delays the entire alication, increasing the need for fault tolerance. In this aer we focus on the execution of one single task knowing that one task imacts the entire system, both in total time of execution and energy consumtion. Each task must comlete a secified amount of work, W, exressed in terms of the number of cycles required to comlete the task. Each task also has a targeted resonse time,t r. Each comuting node has a variable seed, σ, given in cycles er second and bounded such that 0 σ σ max. Therefore the minimum resonse time for a given task is t min = W σ max. In order to achieve our desired fault tolerance a shadow rocess executes in arallel with the main rocess on a different comuting node. Deending on the occurrence of failure during execution, four scenarios are ossible. The first scenario, deicted in Figure 1(a), takes lace when no failure occurs 1. The second scenario, deicted in Figure 1(b), takes lace when failure of the main rocess occurs. Uon failure detection, the shadow rocess increases its rocessor seed and executes until comletion of the task. The third case is if the main rocess comletes successfully and the shadow fails, not deicted due to sace constraints. The last case is both rocesses fail, however this is very unlikely because failure of the nodes are assumed to be indeendent events. The main rocess executes at a single execution seed denoted as σ m. In contrast the shadow rocess executes at two different seeds, a seed before failure detection, σ b, and a seed after failure detection, σ a. This is deicted in Figure 2. Based uon this framework we define some secific time oints signaling system events. The time at which the main rocess comletes a task,t c, is given ast c = W σ m. Additionally, we define the time oint t f as the time at which a failure in the main rocess is detected. B. Power Model In the receding section we have defined shadow relication, now we will derive an analytical model to describe the exected energy consumtion of shadow relication. We begin by defining a ower model used to describe the ower consumed by a single node. It is known that by varying 1 For the urose of this discussion, only a single shadow is considered. The discussion can be easily extended to address multile shadow rocesses
3 Task Work following: Work Comleted main shadow Shadow Stos Executing t2 E(σ,[t 1,t 2 ]) = (σ 3 +ρσmax)dt 3 t=t 1 =(σ 3 +ρσ 3 max)(t 2 t 1 ) (1) Task Start Task Comletion Targeted Resonse Time C. Failure Model Task Work m Work Comleted Task Start Fig. 1. main shadow (a) Case of no failure X Main Fails Shadow Increases Seed (b) Case of failure Targeted Resonse Shadow relication execution model. m X Time t 0 t f t c t r The failure can occur at any oint during the execution of the main or shadow task and the comleted work is unrecoverable. Because the rocesses are executing on different comuting nodes we assume failures are indeendent events. We also assume that only a single failure can occur during the execution of a task. If the main task fails it is therefore imlied that the shadow will comlete without failure. We can make this assumtion because we know the failure of any one node is a rare event thus the failure of any two secific nodes is very unlikely. We assume that two robability density functions, f m (t) and f s (t), exists which exresses the robability of the main or shadow task failing at time t. The model does not assume a secific distribution however in the remainder of this aer we use an exonential robability density function, thus f m (t) = f s (t) = λe λt. % Fig a Overview of Shadow Relication the execution seed of the comuting nodes one can reduce the dynamic CPU ower consumtion at least quadratically by reducing the execution seed linearly. The dynamic CPU ower consumtion of a comuting node executing at seed σ is given by the function (σ), reresented by a olynomial of at least second degree, (σ) = σ n where n 2. In the remainder of this aer we assume that the ower function is the cubic, P(σ) = σ 3. We also consider the amount of static ower which is consumed regardless of the seed of the rocessor. This consumtion of ower is made u of both CPU leakage and all other comonents consuming energy during execution (memory, network, etc.). In this aer we define static ower to be a fixed factor of the ower consumed when the CPU when oerating at full seed, referred to as ρ. The ercentage ρ ρ+1 of static ower in a system is thus defined as. For examle by letting ρ be 4.0, when the CPU is executing at maximum seed it will consume 20% of the total ower, with static ower consuming the remaining 80%. The energy consumed by a comuting node executing at seed σ during an interval [t 1,t 2 ] is given by E(σ,[t 1,t 2 ]) = t2 t=t 1 (σ)dt. Thus the energy function is defined as the D. Energy Model We define the exected system energy for shadow relication given the ower model and the failure distributions. First consider the energy consumed by the main and shadow rocesses if failure does not occur before reaching t c. (1 f m (t)dt) (1 f s (t)dt) (E(σ m,[0,t c ])+E(σ b,[0,t c ])) This first art of this equation is exressing the robabilities that neither rocess fails during the execution interval of the main task, t c. The second art is the energy consumed by both the main and shadow rocesses at their resective rocessor seeds over the same interval, t c. Next, let s consider what haens in the event that the main rocess comletes correctly but the shadow rocess fails before reaching t c. (1 f m (t)dt) [E(σ m,[0,t c ])+ E(σ b,[0,t])f s (t)dt] The first art is the robability that the main rocess doesn t fail. The second art is the amount of energy the main rocess will consume if it comletes the execution. The last art is the amount of energy consumed by the shadow if it fails before the main task is comleted. Because we are assuming only one failure there is one remaining case to consider, that the main rocess fails and (2) (3)
4 the shadow takes over the execution. (1 tr f s (t)dt) [E(σ m,[0,t])+e(σ b,[0,t])+e(σ a,[t,t r ])]f m (t)dt Again the first art of this equation is the robability that the shadow rocess doesn t fail during the resonse time. The second half is the energy consumed by the main and shadow rocess before it fails and then the energy consumed by the shadow taking over the execution. E system is therefore the summation of Equations 2, 3 and 4 which is the total exected system energy consumed by shadow relication assuming only one of the two nodes fails. E. Otimization Problem Using this model we formalize our objective as the following minimization roblem. minimize E system (t r,λ,ρ,w,σ m,σ b,σ a ) subject to t c t r σ m t c W σ b t c +σ a (t r t f ) W It is assumed that node failure model roerties and task roerties are unchangeable system arameters, t r, λ, ρ and W. Therefore the otimization roblem is to find the execution seeds of the rocesses, σ m, σ b and σ a. This results in one formula and three unknowns ad in the next sections we will make use of non-linear otimization techniques to find the energy efficient execution seeds. Recall that t c is the time that the main will comlete the task given no failure, therefore t c = W σ m. The time of failure of the main rocess is defined to be t f and therefore t f t c. III. DETERMINING EXECUTION SPEEDS One of the rimary goals of cloud comuting is to achieve the maximum ossible throughut. Thus, when we aly the shadow relication model we must consider the imact failures will have uon the seed and efficiency of the system. Shadow relication gains its energy conserving roerty by making the assumtion that if a failure occurs there is some degree of laxity as to when the work will be comleted. Similarly, re-execution techniques assume that if a failure occurs one is willing to endure a time delay to the rollback and re-execute. Because of this we defined targeted resonse time,t r, allowing us to bound the laxity. We reresent the targeted resonse time as the laxity factor, α, of the minimum resonse time, t min. For examle if the minimum resonse time is 100 seconds and the targeted resonse time is 125 seconds, the laxity factor is In contrast, a re-execution technique assumes that if a failure occurs the system will have enough time to re-comute, this results in α = This assumes a single failure, if multile failures occur re-execution has the otential to have α > 2.0. (4) (5) Shadow relication and re-execution techniques both exloit time redundancy to rovide fault tolerance, the difference is that shadow relication rovides a model to balance the tradeoff between hardware and time redundancy. If one lets α = 1.0, this imlies there is no laxity, therefore shadow relication will be equivalent to traditional relication. As we increase α shadow relication can begin trading hardware redundancy for time redundancy. We roose two different methods for alying shadow relication. Stretched Relication - Based uon the classic aroach of slowing down to the minimum execution seeds such that the targeted resonse time is still achieved. This results in σ m = σ b = σ a = W/t r. Energy Efficient Relication - Execute at the energy efficient seeds for both the main rocess and the shadow rocess. This requires us to find σ m, σ b and σ a that minimize the exected energy. To solve the otimization roblem we begin with the observation that the seed of the shadow after failure, σ a, is deendent uon the seed before failure, σ b, and the time of failure, t f. In this otimization we then let σ a be the slowest ossible seed to finish by the targeted resonse time, t r. Therefore σ a is no longer constant with resect to the time of failure. From this observation the following value of σ a can be derived. σ a = (W σ b t f )/(t r t f ) (6) This reduces the outut of our otimization to two variables, σ m and σ b. To ensure that the shadow rocess has the ability to comlete all the necessary work and maintain the targeted resonse time we must further constrain σ b. We can derive this constraint from Equation 6 by letting t f = t c and σ a = σ max. This assumes failure occurs at the last ossible time, t c, which would force the seed of the shadow after failure to be the maximum ossible execution seed. We can then derive the following work constraint. t c σ b +(t r t c ) σ max W (7) This constraint imlies that the faster the main rocess executes the more time available to recover from failure but the more energy we consume in the non-failure case. If we execute the main rocess slower, the non-failure case can conserve more energy, however we have less time to recover from a failure. Using this model and the defined constraints we use Mathmatica s non-linear otimization routines to find energy otimal execution seeds, σ m and σ b. Without loss of generality, we assume σ max is normalized such that σ max = 1. IV. ANALYSIS Many cloud roviders are using traditional relication, therefore we begin our comarison by looking at the otential energy savings shadow relication can rovide over this form of relication. In traditional relication each rocess is executed simultaneously with at least one relica rocess and each
5 rocess executes at the maximum seed. One would exect that shadow relication will save energy but the question is how much energy and under what circumstances. All execution seeds in this section will be resented as factors of σ max. 85% 80% 75% 70% 65% 60% 55% 50% 45% 40% 35% 30% 25% 20% 15% 10% 5% Energy Savings α = 2.00 α = 1.75 α = 1.50 α = % 25% 50% 75% Static Power Percent Fig. 3. Energy savings of energy efficient relication when comared to ure relication as we vary static ower. W = 1 hour and MTBF = 5 years. In Figure 3 we show the energy savings for multile values of α, as exected the higher the α value the more energy that can be saved, demonstrating the tradeoff between time and hardware redundancy. We choose to lot α values from 1-2 because the amount of savings lateaus after 2, esecially for high static ower ercentages. We show these results of work size of 1 hour because our sensitivity analysis of the energy model shows work size has very little effect on the energy consumtion when the job sizes are much smaller than the node MTBF, W << MTBF. Given that our node MTBF is 5 years all most reasonable values for work are in this category. The amount of energy savings is also deendent uon the static ower factor, ρ. We therefore vary the ercentage of static ower resent in the system in Figure 3. As we increase the static ower the otential energy savings decreases and eventually matches ure relication. The maximum savings occurs when the static ower is lowest and α is highest, at this oint we can save u to 81% of exected energy for a given task. As static ower aroaches 100% the amount of savings decreases to 0%. There is exerimental data to suort a variety of static ower values, some studies show that the CPU accounts 40-50% [2] of the consumed ower and more recent studies show that number to be 15-30% [7]. Therefore we believe we should be focusing on the acheivable savings when static ower is between 50-85%. In this range energy efficient relication can save between 15-30% of the energy consumed by traditional relication. In Figure 4 we look at the energy savings achievable with stretched relication when comared to that of traditional relication. Similar to energy efficient relication, we observe that as the static ower increases the amount of energy savings decreases. Additionally as static ower increases the higher the α value the less energy one can save with stretched relication. Because while decreasing the execution seeds saves ower at a given oint in time it also increases the execute time thus causing stretched relication to consume more overall energy. Comaring Figures 3 and 4 one can see that energy efficient relication saves more energy for most ercentages of static 81.22% 65.77% 29.79% 15.87% 85% 80% 75% 70% 65% 60% 55% 50% 45% 40% 35% 30% 25% 20% 15% 10% 5% Energy Savings α = 2.00 α = 1.75 α = 1.50 α = % 25% 50% 75% Static Power Percent Fig. 4. Energy savings of stretched relication when comared to ure relication as we vary static ower. W = 1 hour and MTBF = 5 years. ower. However, as static ower reaches 100% the energy savings of both stretched and energy efficient relication converge to zero. This is understandable because both of these energy-aware relication techniques make the assumtion that slowing down the execution seed will be able to reduce energy consumtion. V. CONCLUSION The major contribution of this aer is a new technique, called shadow relication that rovides energy-aware fault tolerance in large-scale distributed comuting environments. We also develo a general framework for evaluating the energy consumtion of relication-based fault tolerant techniques. Using this energy model we then comare shadow relication to current relication techniques. We show that shadow relication has the otential of roviding energy savings of 15-30% of the energy consumed by traditional relication assuming a static ower is 50-85%, which is tyical of most systems today. We further show that a simle imlementation of stretched relication has the ability to also save energy but that energy efficient relication rovides additional energy savings of 5-10%. Most imortantly these results show that shadow relication has the otential to rovide fault tolerance while also roviding energy savings over existing fault tolerant techniques. Motivated by these results we have began work on imlementing shadow relication. This imlementation will then be used to measure the actual energy savings achievable by such a system. REFERENCES [1] L. Barroso and U. Holzle. The case for energy-roortional comuting. Comuter, 40(12):33 37, [2] X. Feng, R. Ge, and K. Cameron. Power and energy rofiling of scientific alications on distributed systems. In Parallel and Distributed Processing Symosium, Proceedings. 19th IEEE International, ages 34 34, [3] K. B. Ferreira. Keeing Checkoint/Restart Viable for Exascale Systems. PhD thesis, University of New Mexico, Albuquerque, New Mexico USA, June [4] B. Li, S. Song, I. Bezakova, and K. Cameron. Energy-aware relica selection for data-intensive services in cloud. In Modeling, Analysis Simulation of Comuter and Telecommunication Systems (MASCOTS), 2012 IEEE 20th International Symosium on, ages , % 60.58% 46.05% 12.06%
6 [5] U. D. of Energy Office of Science. The oortunities and challenges of exascale comuting, [6] W.-T. Tsai, P. Zhong, J. Elston, X. Bai, and Y. Chen. Service relication strategies with mareduce in clouds. In Proceedings of the 2011 Tenth International Symosium on Autonomous Decentralized Systems, ISADS 11, ages , Washington, DC, USA, IEEE Comuter Society. [7] K. Yoshii, K. Iskra, R. Guta, P. Beckman, V. Vishwanath, C. Yu, and S. Coghlan. Evaluating ower-monitoring caabilities on ibm blue gene/ and blue gene/q. In Cluster Comuting (CLUSTER), 2012 IEEE International Conference on, ages 36 44, [8] Q. Zheng. Imroving mareduce fault tolerance in the cloud. In Parallel Distributed Processing, Workshos and Phd Forum (IPDPSW), 2010 IEEE International Symosium on, ages 1 6, 2010.
MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL
Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management
More informationCombining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)
Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment
More informationEnd-to-End Delay Minimization in Thermally Constrained Distributed Systems
End-to-End Delay Minimization in Thermally Constrained Distributed Systems Pratyush Kumar, Lothar Thiele Comuter Engineering and Networks Laboratory (TIK) ETH Zürich, Switzerland {ratyush.kumar, lothar.thiele}@tik.ee.ethz.ch
More informationAnalysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel
Performance Analysis Introduction Analysis of execution time for arallel algorithm to dertmine if it is worth the effort to code and debug in arallel Understanding barriers to high erformance and redict
More informationDistributed Rule-Based Inference in the Presence of Redundant Information
istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced
More informationA generalization of Amdahl's law and relative conditions of parallelism
A generalization of Amdahl's law and relative conditions of arallelism Author: Gianluca Argentini, New Technologies and Models, Riello Grou, Legnago (VR), Italy. E-mail: gianluca.argentini@riellogrou.com
More informationA SIMPLE PLASTICITY MODEL FOR PREDICTING TRANSVERSE COMPOSITE RESPONSE AND FAILURE
THE 19 TH INTERNATIONAL CONFERENCE ON COMPOSITE MATERIALS A SIMPLE PLASTICITY MODEL FOR PREDICTING TRANSVERSE COMPOSITE RESPONSE AND FAILURE K.W. Gan*, M.R. Wisnom, S.R. Hallett, G. Allegri Advanced Comosites
More informationA Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition
A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino
More informationImproved Capacity Bounds for the Binary Energy Harvesting Channel
Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,
More informationComputer arithmetic. Intensive Computation. Annalisa Massini 2017/2018
Comuter arithmetic Intensive Comutation Annalisa Massini 7/8 Intensive Comutation - 7/8 References Comuter Architecture - A Quantitative Aroach Hennessy Patterson Aendix J Intensive Comutation - 7/8 3
More informationEstimation of component redundancy in optimal age maintenance
EURO MAINTENANCE 2012, Belgrade 14-16 May 2012 Proceedings of the 21 st International Congress on Maintenance and Asset Management Estimation of comonent redundancy in otimal age maintenance Jorge ioa
More informationAI*IA 2003 Fusion of Multiple Pattern Classifiers PART III
AI*IA 23 Fusion of Multile Pattern Classifiers PART III AI*IA 23 Tutorial on Fusion of Multile Pattern Classifiers by F. Roli 49 Methods for fusing multile classifiers Methods for fusing multile classifiers
More informationMATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK
Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment
More informationEstimation of the large covariance matrix with two-step monotone missing data
Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo
More informationAn Analysis of Reliable Classifiers through ROC Isometrics
An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit
More informationJohn Weatherwax. Analysis of Parallel Depth First Search Algorithms
Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel
More informationA Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression
Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi
More informationAn Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem
An Ant Colony Otimization Aroach to the Probabilistic Traveling Salesman Problem Leonora Bianchi 1, Luca Maria Gambardella 1, and Marco Dorigo 2 1 IDSIA, Strada Cantonale Galleria 2, CH-6928 Manno, Switzerland
More informationRadial Basis Function Networks: Algorithms
Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.
More informationCharacterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations
Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of
More informationNew Schedulability Test Conditions for Non-preemptive Scheduling on Multiprocessor Platforms
New Schedulability Test Conditions for Non-reemtive Scheduling on Multirocessor Platforms Technical Reort May 2008 Nan Guan 1, Wang Yi 2, Zonghua Gu 3 and Ge Yu 1 1 Northeastern University, Shenyang, China
More informationThe Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule
The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca
More information4. Score normalization technical details We now discuss the technical details of the score normalization method.
SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules
More informationModeling and Estimation of Full-Chip Leakage Current Considering Within-Die Correlation
6.3 Modeling and Estimation of Full-Chi Leaage Current Considering Within-Die Correlation Khaled R. eloue, Navid Azizi, Farid N. Najm Deartment of ECE, University of Toronto,Toronto, Ontario, Canada {haled,nazizi,najm}@eecg.utoronto.ca
More informationPeriodic scheduling 05/06/
Periodic scheduling T T or eriodic scheduling, the best that we can do is to design an algorithm which will always find a schedule if one exists. A scheduler is defined to be otimal iff it will find a
More informationOn the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1
On the Relationshi Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 Imad Antonios antoniosi1@southernct.edu CS Deartment MO117 Southern Connecticut State University 501 Crescent St.
More informationHotelling s Two- Sample T 2
Chater 600 Hotelling s Two- Samle T Introduction This module calculates ower for the Hotelling s two-grou, T-squared (T) test statistic. Hotelling s T is an extension of the univariate two-samle t-test
More informationScaling Multiple Point Statistics for Non-Stationary Geostatistical Modeling
Scaling Multile Point Statistics or Non-Stationary Geostatistical Modeling Julián M. Ortiz, Steven Lyster and Clayton V. Deutsch Centre or Comutational Geostatistics Deartment o Civil & Environmental Engineering
More informationdn i where we have used the Gibbs equation for the Gibbs energy and the definition of chemical potential
Chem 467 Sulement to Lectures 33 Phase Equilibrium Chemical Potential Revisited We introduced the chemical otential as the conjugate variable to amount. Briefly reviewing, the total Gibbs energy of a system
More informationarxiv: v1 [physics.data-an] 26 Oct 2012
Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch
More informationEvaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models
Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu
More informationEnergy-aware optimisation for run-time reconfiguration
Energy-aware otimisation for run-time reconfiguration Tobias Becker and Wayne Luk Deartment of Comuting Imerial College London, UK eter Y. K. Cheung Deartment of Electrical and Electronic Engineering Imerial
More informationUnderstanding and Using Availability
Understanding and Using Availability Jorge Luis Romeu, Ph.D. ASQ CQE/CRE, & Senior Member Email: romeu@cortland.edu htt://myrofile.cos.com/romeu ASQ/RD Webinar Series Noviembre 5, J. L. Romeu - Consultant
More informationFeedback-error control
Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller
More informationApproximating min-max k-clustering
Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost
More informationCHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules
CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules. Introduction: The is widely used in industry to monitor the number of fraction nonconforming units. A nonconforming unit is
More informationRobust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System
Vol.7, No.7 (4),.37-38 htt://dx.doi.org/.457/ica.4.7.7.3 Robust Predictive Control of Inut Constraints and Interference Suression for Semi-Trailer System Zhao, Yang Electronic and Information Technology
More informationSIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING. Ruhul SARKER. Xin YAO
Yugoslav Journal of Oerations Research 13 (003), Number, 45-59 SIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING Ruhul SARKER School of Comuter Science, The University of New South Wales, ADFA,
More informationState Estimation with ARMarkov Models
Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,
More informationLower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data
Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment
More informationOptimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging
1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014
More informationTowards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK
Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)
More informationSession 5: Review of Classical Astrodynamics
Session 5: Review of Classical Astrodynamics In revious lectures we described in detail the rocess to find the otimal secific imulse for a articular situation. Among the mission requirements that serve
More informationAn Adaptive Three-bus Power System Equivalent for Estimating Voltage Stability Margin from Synchronized Phasor Measurements
An Adative Three-bus Power System Equivalent for Estimating oltage Stability argin from Synchronized Phasor easurements Fengkai Hu, Kai Sun University of Tennessee Knoxville, TN, USA fengkaihu@utk.edu
More informationGeneral Linear Model Introduction, Classes of Linear models and Estimation
Stat 740 General Linear Model Introduction, Classes of Linear models and Estimation An aim of scientific enquiry: To describe or to discover relationshis among events (variables) in the controlled (laboratory)
More informationUnderstanding and Using Availability
Understanding and Using Availability Jorge Luis Romeu, Ph.D. ASQ CQE/CRE, & Senior Member C. Stat Fellow, Royal Statistical Society Past Director, Region II (NY & PA) Director: Juarez Lincoln Marti Int
More informationOnline Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies
Online Aendix to Accomany AComarisonof Traditional and Oen-Access Aointment Scheduling Policies Lawrence W. Robinson Johnson Graduate School of Management Cornell University Ithaca, NY 14853-6201 lwr2@cornell.edu
More informationOn Wald-Type Optimal Stopping for Brownian Motion
J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of
More informationAdaptive estimation with change detection for streaming data
Adative estimation with change detection for streaming data A thesis resented for the degree of Doctor of Philosohy of the University of London and the Diloma of Imerial College by Dean Adam Bodenham Deartment
More informationUncertainty Modeling with Interval Type-2 Fuzzy Logic Systems in Mobile Robotics
Uncertainty Modeling with Interval Tye-2 Fuzzy Logic Systems in Mobile Robotics Ondrej Linda, Student Member, IEEE, Milos Manic, Senior Member, IEEE bstract Interval Tye-2 Fuzzy Logic Systems (IT2 FLSs)
More informationKEY ISSUES IN THE ANALYSIS OF PILES IN LIQUEFYING SOILS
4 th International Conference on Earthquake Geotechnical Engineering June 2-28, 27 KEY ISSUES IN THE ANALYSIS OF PILES IN LIQUEFYING SOILS Misko CUBRINOVSKI 1, Hayden BOWEN 1 ABSTRACT Two methods for analysis
More informationPERFORMANCE BASED DESIGN SYSTEM FOR CONCRETE MIXTURE WITH MULTI-OPTIMIZING GENETIC ALGORITHM
PERFORMANCE BASED DESIGN SYSTEM FOR CONCRETE MIXTURE WITH MULTI-OPTIMIZING GENETIC ALGORITHM Takafumi Noguchi 1, Iei Maruyama 1 and Manabu Kanematsu 1 1 Deartment of Architecture, University of Tokyo,
More informationOn the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting
On the Role of Finite Queues in Cooerative Cognitive Radio Networks with Energy Harvesting Mohamed A. Abd-Elmagid, Tamer Elatt, and Karim G. Seddik Wireless Intelligent Networks Center (WINC), Nile University,
More informationThe non-stochastic multi-armed bandit problem
Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at
More informationUsing the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process
Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process P. Mantalos a1, K. Mattheou b, A. Karagrigoriou b a.deartment of Statistics University of Lund
More informationElliptic Curves and Cryptography
Ellitic Curves and Crytograhy Background in Ellitic Curves We'll now turn to the fascinating theory of ellitic curves. For simlicity, we'll restrict our discussion to ellitic curves over Z, where is a
More informationSystem Reliability Estimation and Confidence Regions from Subsystem and Full System Tests
009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract
More informationAnalysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks
Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their
More informationResearch of PMU Optimal Placement in Power Systems
Proceedings of the 5th WSEAS/IASME Int. Conf. on SYSTEMS THEORY and SCIENTIFIC COMPUTATION, Malta, Setember 15-17, 2005 (38-43) Research of PMU Otimal Placement in Power Systems TIAN-TIAN CAI, QIAN AI
More informationCOMMUNICATION BETWEEN SHAREHOLDERS 1
COMMUNICATION BTWN SHARHOLDRS 1 A B. O A : A D Lemma B.1. U to µ Z r 2 σ2 Z + σ2 X 2r ω 2 an additive constant that does not deend on a or θ, the agents ayoffs can be written as: 2r rθa ω2 + θ µ Y rcov
More informationA New Method of DDB Logical Structure Synthesis Using Distributed Tabu Search
A New Method of DDB Logical Structure Synthesis Using Distributed Tabu Search Eduard Babkin and Margarita Karunina 2, National Research University Higher School of Economics Det of nformation Systems and
More informationInformation collection on a graph
Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements
More informationMulti-Operation Multi-Machine Scheduling
Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job
More informationNumerical and experimental investigation on shot-peening induced deformation. Application to sheet metal forming.
Coyright JCPDS-International Centre for Diffraction Data 29 ISSN 197-2 511 Numerical and exerimental investigation on shot-eening induced deformation. Alication to sheet metal forming. Florent Cochennec
More informationAn Investigation on the Numerical Ill-conditioning of Hybrid State Estimators
An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical
More informationAn Analysis of TCP over Random Access Satellite Links
An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance
More informationInformation collection on a graph
Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements
More informationVision Graph Construction in Wireless Multimedia Sensor Networks
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Conference and Worksho Paers Comuter Science and Engineering, Deartment of 21 Vision Grah Construction in Wireless Multimedia
More informationEvaluating Process Capability Indices for some Quality Characteristics of a Manufacturing Process
Journal of Statistical and Econometric Methods, vol., no.3, 013, 105-114 ISSN: 051-5057 (rint version), 051-5065(online) Scienress Ltd, 013 Evaluating Process aability Indices for some Quality haracteristics
More informationASSESSMENT OF NUMERICAL UNCERTAINTY FOR THE CALCULATIONS OF TURBULENT FLOW OVER A BACKWARD FACING STEP
Submitted to Worsho on Uncertainty Estimation October -, 004, Lisbon, Portugal ASSESSMENT OF NUMERICAL UNCERTAINTY FOR THE CALCULATIONS OF TURBULENT FLOW OVER A BACKWARD FACING STEP ABSTRACT Ismail B.
More informationGIVEN an input sequence x 0,..., x n 1 and the
1 Running Max/Min Filters using 1 + o(1) Comarisons er Samle Hao Yuan, Member, IEEE, and Mikhail J. Atallah, Fellow, IEEE Abstract A running max (or min) filter asks for the maximum or (minimum) elements
More informationLinear diophantine equations for discrete tomography
Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,
More informationControllability and Resiliency Analysis in Heat Exchanger Networks
609 A ublication of CHEMICAL ENGINEERING RANSACIONS VOL. 6, 07 Guest Editors: Petar S Varbanov, Rongxin Su, Hon Loong Lam, Xia Liu, Jiří J Klemeš Coyright 07, AIDIC Servizi S.r.l. ISBN 978-88-95608-5-8;
More informationFig. 21: Architecture of PeerSim [44]
Sulementary Aendix A: Modeling HPP with PeerSim Fig. : Architecture of PeerSim [] In PeerSim, every comonent can be relaced by another comonent imlementing the same interface, and the general simulation
More informationUse of Transformations and the Repeated Statement in PROC GLM in SAS Ed Stanek
Use of Transformations and the Reeated Statement in PROC GLM in SAS Ed Stanek Introduction We describe how the Reeated Statement in PROC GLM in SAS transforms the data to rovide tests of hyotheses of interest.
More informationDETC2003/DAC AN EFFICIENT ALGORITHM FOR CONSTRUCTING OPTIMAL DESIGN OF COMPUTER EXPERIMENTS
Proceedings of DETC 03 ASME 003 Design Engineering Technical Conferences and Comuters and Information in Engineering Conference Chicago, Illinois USA, Setember -6, 003 DETC003/DAC-48760 AN EFFICIENT ALGORITHM
More informationAn Outdoor Recreation Use Model with Applications to Evaluating Survey Estimators
United States Deartment of Agriculture Forest Service Southern Research Station An Outdoor Recreation Use Model with Alications to Evaluating Survey Estimators Stanley J. Zarnoch, Donald B.K. English,
More informationOptimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment
Neutrosohic Sets and Systems Vol 14 016 93 University of New Mexico Otimal Design of Truss Structures Using a Neutrosohic Number Otimization Model under an Indeterminate Environment Wenzhong Jiang & Jun
More informationModeling Residual-Geometric Flow Sampling
1 Modeling Residual-Geometric Flow Samling Xiaoming Wang, Xiaoyong Li, and Dmitri Loguinov Abstract Traffic monitoring and estimation of flow arameters in high seed routers have recently become challenging
More informationResearch of power plant parameter based on the Principal Component Analysis method
Research of ower lant arameter based on the Princial Comonent Analysis method Yang Yang *a, Di Zhang b a b School of Engineering, Bohai University, Liaoning Jinzhou, 3; Liaoning Datang international Jinzhou
More informationA MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION
O P E R A T I O N S R E S E A R C H A N D D E C I S I O N S No. 27 DOI:.5277/ord73 Nasrullah KHAN Muhammad ASLAM 2 Kyung-Jun KIM 3 Chi-Hyuck JUN 4 A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST
More informationUncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning
TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment
More information1-way quantum finite automata: strengths, weaknesses and generalizations
1-way quantum finite automata: strengths, weaknesses and generalizations arxiv:quant-h/9802062v3 30 Se 1998 Andris Ambainis UC Berkeley Abstract Rūsiņš Freivalds University of Latvia We study 1-way quantum
More informationNUMERICAL AND THEORETICAL INVESTIGATIONS ON DETONATION- INERT CONFINEMENT INTERACTIONS
NUMERICAL AND THEORETICAL INVESTIGATIONS ON DETONATION- INERT CONFINEMENT INTERACTIONS Tariq D. Aslam and John B. Bdzil Los Alamos National Laboratory Los Alamos, NM 87545 hone: 1-55-667-1367, fax: 1-55-667-6372
More informationOn split sample and randomized confidence intervals for binomial proportions
On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have
More informationAnalysis of M/M/n/K Queue with Multiple Priorities
Analysis of M/M/n/K Queue with Multile Priorities Coyright, Sanjay K. Bose For a P-riority system, class P of highest riority Indeendent, Poisson arrival rocesses for each class with i as average arrival
More informationAnalysis of some entrance probabilities for killed birth-death processes
Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction
More informationDiverse Routing in Networks with Probabilistic Failures
Diverse Routing in Networks with Probabilistic Failures Hyang-Won Lee, Member, IEEE, Eytan Modiano, Senior Member, IEEE, Kayi Lee, Member, IEEE Abstract We develo diverse routing schemes for dealing with
More informationRANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES
RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete
More informationMODEL-BASED MULTIPLE FAULT DETECTION AND ISOLATION FOR NONLINEAR SYSTEMS
MODEL-BASED MULIPLE FAUL DEECION AND ISOLAION FOR NONLINEAR SYSEMS Ivan Castillo, and homas F. Edgar he University of exas at Austin Austin, X 78712 David Hill Chemstations Houston, X 77009 Abstract A
More informationDesign Constraint for Fine Grain Supply Voltage Control LSI
ASP-DAC 211 Designer s Forum Session 8D-3: State-of-The-Art SoCs and Design Methodologies Design Constraint for Fine Grain Suly Voltage Control LSI January 28, 211 Atsuki Inoue Platform Technologies Laboratories
More informationCharacteristics of Beam-Based Flexure Modules
Shorya Awtar e-mail: shorya@mit.edu Alexander H. Slocum e-mail: slocum@mit.edu Precision Engineering Research Grou, Massachusetts Institute of Technology, Cambridge, MA 039 Edi Sevincer Omega Advanced
More informationCalculation of MTTF values with Markov Models for Safety Instrumented Systems
7th WEA International Conference on APPLIE COMPUTE CIENCE, Venice, Italy, November -3, 7 3 Calculation of MTTF values with Markov Models for afety Instrumented ystems BÖCÖK J., UGLJEA E., MACHMU. University
More informationOn Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm
On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm Gabriel Noriega, José Restreo, Víctor Guzmán, Maribel Giménez and José Aller Universidad Simón Bolívar Valle de Sartenejas,
More informationFactors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doped Fiber Amplifier
Australian Journal of Basic and Alied Sciences, 5(12): 2010-2020, 2011 ISSN 1991-8178 Factors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doed Fiber Amlifier
More informationHidden Predictors: A Factor Analysis Primer
Hidden Predictors: A Factor Analysis Primer Ryan C Sanchez Western Washington University Factor Analysis is a owerful statistical method in the modern research sychologist s toolbag When used roerly, factor
More informationPOWER DENSITY OPTIMIZATION OF AN ARRAY OF PIEZOELECTRIC HARVESTERS USING A GENETIC ALGORITHM
International Worksho SMART MATERIALS, STRUCTURES & NDT in AEROSPACE Conference NDT in Canada 11-4 November 11, Montreal, Quebec, Canada POWER DENSITY OPTIMIZATION OF AN ARRAY OF PIEZOELECTRIC HARVESTERS
More informationCheckpointing algorithms and fault prediction
hal-78833, version - 4 Feb 23 Checkointing algorithms and fault rediction Guillaume Auy, Yves Robert, Frédéric Vivien, Dounia Zaidouni RESEARCH REPORT N 8237 February 23 Project-Team ROMA ISSN 249-6399
More informationPhysical based Schottky barrier diode modeling for THz applications
Downloaded from orbit.dtu.dk on: Jan 6, 18 Physical based Schottky barrier diode modeling THz alications Yan, Lei; Krozer, iktor; Michaelsen, Rasmus Schandorh; Durhuus, Torsten; Johansen, Tom Keinicke
More informationFinite Mixture EFA in Mplus
Finite Mixture EFA in Mlus November 16, 2007 In this document we describe the Mixture EFA model estimated in Mlus. Four tyes of deendent variables are ossible in this model: normally distributed, ordered
More information