Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Size: px
Start display at page:

Download "Shadow Computing: An Energy-Aware Fault Tolerant Computing Model"

Transcription

1 Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, Index Terms shadow comuting, fault tolerance, scheduling, resiliency Abstract The current resonse to fault tolerance relies uon either time or hardware redundancy in order to mask faults. Time redundancy imlies a re-execution of the failed comutation after the failure has been detected, although this can further be otimized by the use of checkoints these solutions still imose a significant delay. In many mission critical systems hardware redundancy has traditionally deloyed in the form of rocess relication to rovide fault tolerance, avoiding delay and maintaining tight deadlines. Both aroaches have drawbacks, re-execution requiring additional time and relication requiring additional resources, esecially energy. This forces the systems engineer to choose between time or hardware redundancy, cloud comuting environments have largely chosen relication because resonse time is often critical. In this aer we roose a new comutational model called shadow comuting, which rovides goal-based adative resilience through the use of dynamic execution. Using this general model we develo shadow relication which enables a arameterized tradeoff between time and hardware redundancy to rovide fault tolerance. Then we build an analytical model to redict the exected energy savings and rovide an analysis using that model. I. INTRODUCTION Power consumtion is widely recognized as one of the most significant challenges facing data centers in both cloud comuting and high erformance comuting (HPC) [5], [1]. Addressing such a challenge requires building ower and energy awareness into the foundations of future comuting models. New aroaches must be develoed to achieve efficient energy management across all hardware and software comonents of the system. The increase in energy consumtion is a direct result of an increase in the number of comuting nodes, conversely this has an equally negative effect on the overall system reliability. Even if the individual node failure rate is low, the overall system failure rate quickly becomes unaccetable as the number of comonents increases. For examle, a comuting system with 200,000 nodes will exerience a mean time between failure (MTBF) of less than one hour, even when the MTBF of an individual node is 5 years [3]. Future systems will clearly need to be fault tolerant and at the same time be energy-aware. This work is suorted in art by NSF grants CNS and CNS The common resonse to faults is to restart the execution of the alication after a failure, including those comonents of its software environment that have been affected by the occurring fault. Re-execution techniques can occur at different oints of the alication, ossibly involving the comlete reexecution of the task although usually a checkoint is used to reduce the amount of rework necessary. In either case the reexecution will cause a delay. To avoid this delay most cloud environments have chosen rocess relication [6], [8], [4] to mask faults removing the delay of re-execution. It is clear that while relication rovides a method of achieving fault tolerance it is not energy efficient because, by its very nature, it costs twice as much as a single rocess. The main objective of this aer is to exlore a new comutational model called shadow comuting by develoing an energy-aware fault-tolerance method called shadow relication. We show that this method not only rovides fault tolerance but can rovide energy savings of 15-30% in existing systems. A. Shadow Comuting We are roosing a new comutational model, called shadow comuting, which rovides goal-based adative resilience using dynamic execution to meet the requirements of comlex alications in highly arallelized faulty environments. Adative Resilience is the ability of the system to dynamically harness all available resources to achieve the highest level of QoS for a given alication. Dynamic execution is the ability to execute an alication while being able to change the QoS of that alication. For examle, in this aer we exloit the ability to execute rocesses at variable execution seeds using dynamic voltage and frequency scaling (DVFS), changing the QoS of alication resonse time. The challenge is to maintain or exceed the alications QoS while minimizing the system resources in site of systems-level changes, such as failures or the availability of additional system resources. In order to achieve adative resilience, the shadow comuting model associates a set of shadows to the main execution, which are dynamically instantiated and adjusted in order to address the current state of the system and maintain the alication s QoS requirements. The objective of this aer is to balance the system resource of ower with the QoS of alication resonse time in the resence

2 of system faults. To this end, we roose shadow relication which is the ability of the system to adatively execute either entirely or artially the original task to overcome failures, while minimizing system ower. B. Shadow Relication The basic idea of shadow relication is to associate with each rocess a suite of shadow rocesses, whose size deends on the criticality and erformance requirements of the underlying alication. A shadow rocess is an exact relica of the main rocess. In order to overcome failure, the shadow is scheduled to execute concurrently with the main rocess, but at a different comuting node. Furthermore, in order to minimize energy, shadow rocesses initially execute at decreasingly lower rocessor seeds. The successful comletion of the main rocess results in the immediate termination of all shadow rocesses. If the main rocess fails, however, the rimary shadow rocess immediately takes over the role of the main rocess and resumes comutation, ossibly at an increased seed, in order to comlete the task. Moreover, one among the remaining shadow rocesses is then romoted to be the rimary shadow rocess. The main challenge in realizing the otential of the shadow relication stems from the need to comute the seed of execution of the main rocess and the seed of execution of its associated shadows, both before and after a failure occurs, so that the target resonse time is met, while minimizing energy consumtion. Since the failure of an individual comonent is much lower than the aggregate system failure, it is very likely that most of the time the main rocesses comlete their execution successfully. Successful comletion of a main rocess automatically results in the immediate halting of its associated shadow rocesses, roviding a significant savings in energy consumtion. Furthermore, the number of shadow rocesses to be instantiated in order to achieve the desired level of faulttolerance must be determined based on the likelihood that more than one rocess fails within the execution time interval of the main task. The comletion of a main or its shadow results in the successful execution of the underlying task. The main contributions of this aer are threefold. First, we resent an otimization framework to exlore the alicability of the shadow relication to rovide fault-tolerance in an energy efficient manner. Second, using the otimization framework, we roose and study two imlementation methods of the shadow relication model. The first method, referred to as stretched relication, takes the trivial aroach to minimizing energy by reducing the seed of execution of both the main and the relica such that the task deadline is maintained. Although simle to imlement, stretched relication is oblivious to the dynamics of the failure, otentially resulting in sub-otimal energy erformance. The second method, referred to as energy efficient relication, comutes energy efficient execution seeds which maintain the exected resonse time regardless of failure rates. Third, we conduct a erformance evaluation to assess the erformance of shadow relication, comaring the energy consumtion of shadow relication to that of traditional relication. II. ENERGY OPTIMIZATION MODEL In this section, we define a framework for evaluating shadow relication and then use this to derive a model for reresenting the exected energy consumed by the system. A. Shadow Relication Framework We consider a distributed comuting environment executing an alication carried out by a large number of collaborative tasks. The successful execution of the alication deends on the successful comletion of all of these tasks. Therefore the failure of a single rocess delays the entire alication, increasing the need for fault tolerance. In this aer we focus on the execution of one single task knowing that one task imacts the entire system, both in total time of execution and energy consumtion. Each task must comlete a secified amount of work, W, exressed in terms of the number of cycles required to comlete the task. Each task also has a targeted resonse time,t r. Each comuting node has a variable seed, σ, given in cycles er second and bounded such that 0 σ σ max. Therefore the minimum resonse time for a given task is t min = W σ max. In order to achieve our desired fault tolerance a shadow rocess executes in arallel with the main rocess on a different comuting node. Deending on the occurrence of failure during execution, four scenarios are ossible. The first scenario, deicted in Figure 1(a), takes lace when no failure occurs 1. The second scenario, deicted in Figure 1(b), takes lace when failure of the main rocess occurs. Uon failure detection, the shadow rocess increases its rocessor seed and executes until comletion of the task. The third case is if the main rocess comletes successfully and the shadow fails, not deicted due to sace constraints. The last case is both rocesses fail, however this is very unlikely because failure of the nodes are assumed to be indeendent events. The main rocess executes at a single execution seed denoted as σ m. In contrast the shadow rocess executes at two different seeds, a seed before failure detection, σ b, and a seed after failure detection, σ a. This is deicted in Figure 2. Based uon this framework we define some secific time oints signaling system events. The time at which the main rocess comletes a task,t c, is given ast c = W σ m. Additionally, we define the time oint t f as the time at which a failure in the main rocess is detected. B. Power Model In the receding section we have defined shadow relication, now we will derive an analytical model to describe the exected energy consumtion of shadow relication. We begin by defining a ower model used to describe the ower consumed by a single node. It is known that by varying 1 For the urose of this discussion, only a single shadow is considered. The discussion can be easily extended to address multile shadow rocesses

3 Task Work following: Work Comleted main shadow Shadow Stos Executing t2 E(σ,[t 1,t 2 ]) = (σ 3 +ρσmax)dt 3 t=t 1 =(σ 3 +ρσ 3 max)(t 2 t 1 ) (1) Task Start Task Comletion Targeted Resonse Time C. Failure Model Task Work m Work Comleted Task Start Fig. 1. main shadow (a) Case of no failure X Main Fails Shadow Increases Seed (b) Case of failure Targeted Resonse Shadow relication execution model. m X Time t 0 t f t c t r The failure can occur at any oint during the execution of the main or shadow task and the comleted work is unrecoverable. Because the rocesses are executing on different comuting nodes we assume failures are indeendent events. We also assume that only a single failure can occur during the execution of a task. If the main task fails it is therefore imlied that the shadow will comlete without failure. We can make this assumtion because we know the failure of any one node is a rare event thus the failure of any two secific nodes is very unlikely. We assume that two robability density functions, f m (t) and f s (t), exists which exresses the robability of the main or shadow task failing at time t. The model does not assume a secific distribution however in the remainder of this aer we use an exonential robability density function, thus f m (t) = f s (t) = λe λt. % Fig a Overview of Shadow Relication the execution seed of the comuting nodes one can reduce the dynamic CPU ower consumtion at least quadratically by reducing the execution seed linearly. The dynamic CPU ower consumtion of a comuting node executing at seed σ is given by the function (σ), reresented by a olynomial of at least second degree, (σ) = σ n where n 2. In the remainder of this aer we assume that the ower function is the cubic, P(σ) = σ 3. We also consider the amount of static ower which is consumed regardless of the seed of the rocessor. This consumtion of ower is made u of both CPU leakage and all other comonents consuming energy during execution (memory, network, etc.). In this aer we define static ower to be a fixed factor of the ower consumed when the CPU when oerating at full seed, referred to as ρ. The ercentage ρ ρ+1 of static ower in a system is thus defined as. For examle by letting ρ be 4.0, when the CPU is executing at maximum seed it will consume 20% of the total ower, with static ower consuming the remaining 80%. The energy consumed by a comuting node executing at seed σ during an interval [t 1,t 2 ] is given by E(σ,[t 1,t 2 ]) = t2 t=t 1 (σ)dt. Thus the energy function is defined as the D. Energy Model We define the exected system energy for shadow relication given the ower model and the failure distributions. First consider the energy consumed by the main and shadow rocesses if failure does not occur before reaching t c. (1 f m (t)dt) (1 f s (t)dt) (E(σ m,[0,t c ])+E(σ b,[0,t c ])) This first art of this equation is exressing the robabilities that neither rocess fails during the execution interval of the main task, t c. The second art is the energy consumed by both the main and shadow rocesses at their resective rocessor seeds over the same interval, t c. Next, let s consider what haens in the event that the main rocess comletes correctly but the shadow rocess fails before reaching t c. (1 f m (t)dt) [E(σ m,[0,t c ])+ E(σ b,[0,t])f s (t)dt] The first art is the robability that the main rocess doesn t fail. The second art is the amount of energy the main rocess will consume if it comletes the execution. The last art is the amount of energy consumed by the shadow if it fails before the main task is comleted. Because we are assuming only one failure there is one remaining case to consider, that the main rocess fails and (2) (3)

4 the shadow takes over the execution. (1 tr f s (t)dt) [E(σ m,[0,t])+e(σ b,[0,t])+e(σ a,[t,t r ])]f m (t)dt Again the first art of this equation is the robability that the shadow rocess doesn t fail during the resonse time. The second half is the energy consumed by the main and shadow rocess before it fails and then the energy consumed by the shadow taking over the execution. E system is therefore the summation of Equations 2, 3 and 4 which is the total exected system energy consumed by shadow relication assuming only one of the two nodes fails. E. Otimization Problem Using this model we formalize our objective as the following minimization roblem. minimize E system (t r,λ,ρ,w,σ m,σ b,σ a ) subject to t c t r σ m t c W σ b t c +σ a (t r t f ) W It is assumed that node failure model roerties and task roerties are unchangeable system arameters, t r, λ, ρ and W. Therefore the otimization roblem is to find the execution seeds of the rocesses, σ m, σ b and σ a. This results in one formula and three unknowns ad in the next sections we will make use of non-linear otimization techniques to find the energy efficient execution seeds. Recall that t c is the time that the main will comlete the task given no failure, therefore t c = W σ m. The time of failure of the main rocess is defined to be t f and therefore t f t c. III. DETERMINING EXECUTION SPEEDS One of the rimary goals of cloud comuting is to achieve the maximum ossible throughut. Thus, when we aly the shadow relication model we must consider the imact failures will have uon the seed and efficiency of the system. Shadow relication gains its energy conserving roerty by making the assumtion that if a failure occurs there is some degree of laxity as to when the work will be comleted. Similarly, re-execution techniques assume that if a failure occurs one is willing to endure a time delay to the rollback and re-execute. Because of this we defined targeted resonse time,t r, allowing us to bound the laxity. We reresent the targeted resonse time as the laxity factor, α, of the minimum resonse time, t min. For examle if the minimum resonse time is 100 seconds and the targeted resonse time is 125 seconds, the laxity factor is In contrast, a re-execution technique assumes that if a failure occurs the system will have enough time to re-comute, this results in α = This assumes a single failure, if multile failures occur re-execution has the otential to have α > 2.0. (4) (5) Shadow relication and re-execution techniques both exloit time redundancy to rovide fault tolerance, the difference is that shadow relication rovides a model to balance the tradeoff between hardware and time redundancy. If one lets α = 1.0, this imlies there is no laxity, therefore shadow relication will be equivalent to traditional relication. As we increase α shadow relication can begin trading hardware redundancy for time redundancy. We roose two different methods for alying shadow relication. Stretched Relication - Based uon the classic aroach of slowing down to the minimum execution seeds such that the targeted resonse time is still achieved. This results in σ m = σ b = σ a = W/t r. Energy Efficient Relication - Execute at the energy efficient seeds for both the main rocess and the shadow rocess. This requires us to find σ m, σ b and σ a that minimize the exected energy. To solve the otimization roblem we begin with the observation that the seed of the shadow after failure, σ a, is deendent uon the seed before failure, σ b, and the time of failure, t f. In this otimization we then let σ a be the slowest ossible seed to finish by the targeted resonse time, t r. Therefore σ a is no longer constant with resect to the time of failure. From this observation the following value of σ a can be derived. σ a = (W σ b t f )/(t r t f ) (6) This reduces the outut of our otimization to two variables, σ m and σ b. To ensure that the shadow rocess has the ability to comlete all the necessary work and maintain the targeted resonse time we must further constrain σ b. We can derive this constraint from Equation 6 by letting t f = t c and σ a = σ max. This assumes failure occurs at the last ossible time, t c, which would force the seed of the shadow after failure to be the maximum ossible execution seed. We can then derive the following work constraint. t c σ b +(t r t c ) σ max W (7) This constraint imlies that the faster the main rocess executes the more time available to recover from failure but the more energy we consume in the non-failure case. If we execute the main rocess slower, the non-failure case can conserve more energy, however we have less time to recover from a failure. Using this model and the defined constraints we use Mathmatica s non-linear otimization routines to find energy otimal execution seeds, σ m and σ b. Without loss of generality, we assume σ max is normalized such that σ max = 1. IV. ANALYSIS Many cloud roviders are using traditional relication, therefore we begin our comarison by looking at the otential energy savings shadow relication can rovide over this form of relication. In traditional relication each rocess is executed simultaneously with at least one relica rocess and each

5 rocess executes at the maximum seed. One would exect that shadow relication will save energy but the question is how much energy and under what circumstances. All execution seeds in this section will be resented as factors of σ max. 85% 80% 75% 70% 65% 60% 55% 50% 45% 40% 35% 30% 25% 20% 15% 10% 5% Energy Savings α = 2.00 α = 1.75 α = 1.50 α = % 25% 50% 75% Static Power Percent Fig. 3. Energy savings of energy efficient relication when comared to ure relication as we vary static ower. W = 1 hour and MTBF = 5 years. In Figure 3 we show the energy savings for multile values of α, as exected the higher the α value the more energy that can be saved, demonstrating the tradeoff between time and hardware redundancy. We choose to lot α values from 1-2 because the amount of savings lateaus after 2, esecially for high static ower ercentages. We show these results of work size of 1 hour because our sensitivity analysis of the energy model shows work size has very little effect on the energy consumtion when the job sizes are much smaller than the node MTBF, W << MTBF. Given that our node MTBF is 5 years all most reasonable values for work are in this category. The amount of energy savings is also deendent uon the static ower factor, ρ. We therefore vary the ercentage of static ower resent in the system in Figure 3. As we increase the static ower the otential energy savings decreases and eventually matches ure relication. The maximum savings occurs when the static ower is lowest and α is highest, at this oint we can save u to 81% of exected energy for a given task. As static ower aroaches 100% the amount of savings decreases to 0%. There is exerimental data to suort a variety of static ower values, some studies show that the CPU accounts 40-50% [2] of the consumed ower and more recent studies show that number to be 15-30% [7]. Therefore we believe we should be focusing on the acheivable savings when static ower is between 50-85%. In this range energy efficient relication can save between 15-30% of the energy consumed by traditional relication. In Figure 4 we look at the energy savings achievable with stretched relication when comared to that of traditional relication. Similar to energy efficient relication, we observe that as the static ower increases the amount of energy savings decreases. Additionally as static ower increases the higher the α value the less energy one can save with stretched relication. Because while decreasing the execution seeds saves ower at a given oint in time it also increases the execute time thus causing stretched relication to consume more overall energy. Comaring Figures 3 and 4 one can see that energy efficient relication saves more energy for most ercentages of static 81.22% 65.77% 29.79% 15.87% 85% 80% 75% 70% 65% 60% 55% 50% 45% 40% 35% 30% 25% 20% 15% 10% 5% Energy Savings α = 2.00 α = 1.75 α = 1.50 α = % 25% 50% 75% Static Power Percent Fig. 4. Energy savings of stretched relication when comared to ure relication as we vary static ower. W = 1 hour and MTBF = 5 years. ower. However, as static ower reaches 100% the energy savings of both stretched and energy efficient relication converge to zero. This is understandable because both of these energy-aware relication techniques make the assumtion that slowing down the execution seed will be able to reduce energy consumtion. V. CONCLUSION The major contribution of this aer is a new technique, called shadow relication that rovides energy-aware fault tolerance in large-scale distributed comuting environments. We also develo a general framework for evaluating the energy consumtion of relication-based fault tolerant techniques. Using this energy model we then comare shadow relication to current relication techniques. We show that shadow relication has the otential of roviding energy savings of 15-30% of the energy consumed by traditional relication assuming a static ower is 50-85%, which is tyical of most systems today. We further show that a simle imlementation of stretched relication has the ability to also save energy but that energy efficient relication rovides additional energy savings of 5-10%. Most imortantly these results show that shadow relication has the otential to rovide fault tolerance while also roviding energy savings over existing fault tolerant techniques. Motivated by these results we have began work on imlementing shadow relication. This imlementation will then be used to measure the actual energy savings achievable by such a system. REFERENCES [1] L. Barroso and U. Holzle. The case for energy-roortional comuting. Comuter, 40(12):33 37, [2] X. Feng, R. Ge, and K. Cameron. Power and energy rofiling of scientific alications on distributed systems. In Parallel and Distributed Processing Symosium, Proceedings. 19th IEEE International, ages 34 34, [3] K. B. Ferreira. Keeing Checkoint/Restart Viable for Exascale Systems. PhD thesis, University of New Mexico, Albuquerque, New Mexico USA, June [4] B. Li, S. Song, I. Bezakova, and K. Cameron. Energy-aware relica selection for data-intensive services in cloud. In Modeling, Analysis Simulation of Comuter and Telecommunication Systems (MASCOTS), 2012 IEEE 20th International Symosium on, ages , % 60.58% 46.05% 12.06%

6 [5] U. D. of Energy Office of Science. The oortunities and challenges of exascale comuting, [6] W.-T. Tsai, P. Zhong, J. Elston, X. Bai, and Y. Chen. Service relication strategies with mareduce in clouds. In Proceedings of the 2011 Tenth International Symosium on Autonomous Decentralized Systems, ISADS 11, ages , Washington, DC, USA, IEEE Comuter Society. [7] K. Yoshii, K. Iskra, R. Guta, P. Beckman, V. Vishwanath, C. Yu, and S. Coghlan. Evaluating ower-monitoring caabilities on ibm blue gene/ and blue gene/q. In Cluster Comuting (CLUSTER), 2012 IEEE International Conference on, ages 36 44, [8] Q. Zheng. Imroving mareduce fault tolerance in the cloud. In Parallel Distributed Processing, Workshos and Phd Forum (IPDPSW), 2010 IEEE International Symosium on, ages 1 6, 2010.

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

End-to-End Delay Minimization in Thermally Constrained Distributed Systems

End-to-End Delay Minimization in Thermally Constrained Distributed Systems End-to-End Delay Minimization in Thermally Constrained Distributed Systems Pratyush Kumar, Lothar Thiele Comuter Engineering and Networks Laboratory (TIK) ETH Zürich, Switzerland {ratyush.kumar, lothar.thiele}@tik.ee.ethz.ch

More information

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel Performance Analysis Introduction Analysis of execution time for arallel algorithm to dertmine if it is worth the effort to code and debug in arallel Understanding barriers to high erformance and redict

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

A generalization of Amdahl's law and relative conditions of parallelism

A generalization of Amdahl's law and relative conditions of parallelism A generalization of Amdahl's law and relative conditions of arallelism Author: Gianluca Argentini, New Technologies and Models, Riello Grou, Legnago (VR), Italy. E-mail: gianluca.argentini@riellogrou.com

More information

A SIMPLE PLASTICITY MODEL FOR PREDICTING TRANSVERSE COMPOSITE RESPONSE AND FAILURE

A SIMPLE PLASTICITY MODEL FOR PREDICTING TRANSVERSE COMPOSITE RESPONSE AND FAILURE THE 19 TH INTERNATIONAL CONFERENCE ON COMPOSITE MATERIALS A SIMPLE PLASTICITY MODEL FOR PREDICTING TRANSVERSE COMPOSITE RESPONSE AND FAILURE K.W. Gan*, M.R. Wisnom, S.R. Hallett, G. Allegri Advanced Comosites

More information

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018 Comuter arithmetic Intensive Comutation Annalisa Massini 7/8 Intensive Comutation - 7/8 References Comuter Architecture - A Quantitative Aroach Hennessy Patterson Aendix J Intensive Comutation - 7/8 3

More information

Estimation of component redundancy in optimal age maintenance

Estimation of component redundancy in optimal age maintenance EURO MAINTENANCE 2012, Belgrade 14-16 May 2012 Proceedings of the 21 st International Congress on Maintenance and Asset Management Estimation of comonent redundancy in otimal age maintenance Jorge ioa

More information

AI*IA 2003 Fusion of Multiple Pattern Classifiers PART III

AI*IA 2003 Fusion of Multiple Pattern Classifiers PART III AI*IA 23 Fusion of Multile Pattern Classifiers PART III AI*IA 23 Tutorial on Fusion of Multile Pattern Classifiers by F. Roli 49 Methods for fusing multile classifiers Methods for fusing multile classifiers

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi

More information

An Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem

An Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem An Ant Colony Otimization Aroach to the Probabilistic Traveling Salesman Problem Leonora Bianchi 1, Luca Maria Gambardella 1, and Marco Dorigo 2 1 IDSIA, Strada Cantonale Galleria 2, CH-6928 Manno, Switzerland

More information

Radial Basis Function Networks: Algorithms

Radial Basis Function Networks: Algorithms Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.

More information

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of

More information

New Schedulability Test Conditions for Non-preemptive Scheduling on Multiprocessor Platforms

New Schedulability Test Conditions for Non-preemptive Scheduling on Multiprocessor Platforms New Schedulability Test Conditions for Non-reemtive Scheduling on Multirocessor Platforms Technical Reort May 2008 Nan Guan 1, Wang Yi 2, Zonghua Gu 3 and Ge Yu 1 1 Northeastern University, Shenyang, China

More information

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

Modeling and Estimation of Full-Chip Leakage Current Considering Within-Die Correlation

Modeling and Estimation of Full-Chip Leakage Current Considering Within-Die Correlation 6.3 Modeling and Estimation of Full-Chi Leaage Current Considering Within-Die Correlation Khaled R. eloue, Navid Azizi, Farid N. Najm Deartment of ECE, University of Toronto,Toronto, Ontario, Canada {haled,nazizi,najm}@eecg.utoronto.ca

More information

Periodic scheduling 05/06/

Periodic scheduling 05/06/ Periodic scheduling T T or eriodic scheduling, the best that we can do is to design an algorithm which will always find a schedule if one exists. A scheduler is defined to be otimal iff it will find a

More information

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 On the Relationshi Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 Imad Antonios antoniosi1@southernct.edu CS Deartment MO117 Southern Connecticut State University 501 Crescent St.

More information

Hotelling s Two- Sample T 2

Hotelling s Two- Sample T 2 Chater 600 Hotelling s Two- Samle T Introduction This module calculates ower for the Hotelling s two-grou, T-squared (T) test statistic. Hotelling s T is an extension of the univariate two-samle t-test

More information

Scaling Multiple Point Statistics for Non-Stationary Geostatistical Modeling

Scaling Multiple Point Statistics for Non-Stationary Geostatistical Modeling Scaling Multile Point Statistics or Non-Stationary Geostatistical Modeling Julián M. Ortiz, Steven Lyster and Clayton V. Deutsch Centre or Comutational Geostatistics Deartment o Civil & Environmental Engineering

More information

dn i where we have used the Gibbs equation for the Gibbs energy and the definition of chemical potential

dn i where we have used the Gibbs equation for the Gibbs energy and the definition of chemical potential Chem 467 Sulement to Lectures 33 Phase Equilibrium Chemical Potential Revisited We introduced the chemical otential as the conjugate variable to amount. Briefly reviewing, the total Gibbs energy of a system

More information

arxiv: v1 [physics.data-an] 26 Oct 2012

arxiv: v1 [physics.data-an] 26 Oct 2012 Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch

More information

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu

More information

Energy-aware optimisation for run-time reconfiguration

Energy-aware optimisation for run-time reconfiguration Energy-aware otimisation for run-time reconfiguration Tobias Becker and Wayne Luk Deartment of Comuting Imerial College London, UK eter Y. K. Cheung Deartment of Electrical and Electronic Engineering Imerial

More information

Understanding and Using Availability

Understanding and Using Availability Understanding and Using Availability Jorge Luis Romeu, Ph.D. ASQ CQE/CRE, & Senior Member Email: romeu@cortland.edu htt://myrofile.cos.com/romeu ASQ/RD Webinar Series Noviembre 5, J. L. Romeu - Consultant

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules. Introduction: The is widely used in industry to monitor the number of fraction nonconforming units. A nonconforming unit is

More information

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System Vol.7, No.7 (4),.37-38 htt://dx.doi.org/.457/ica.4.7.7.3 Robust Predictive Control of Inut Constraints and Interference Suression for Semi-Trailer System Zhao, Yang Electronic and Information Technology

More information

SIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING. Ruhul SARKER. Xin YAO

SIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING. Ruhul SARKER. Xin YAO Yugoslav Journal of Oerations Research 13 (003), Number, 45-59 SIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING Ruhul SARKER School of Comuter Science, The University of New South Wales, ADFA,

More information

State Estimation with ARMarkov Models

State Estimation with ARMarkov Models Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,

More information

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging 1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014

More information

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)

More information

Session 5: Review of Classical Astrodynamics

Session 5: Review of Classical Astrodynamics Session 5: Review of Classical Astrodynamics In revious lectures we described in detail the rocess to find the otimal secific imulse for a articular situation. Among the mission requirements that serve

More information

An Adaptive Three-bus Power System Equivalent for Estimating Voltage Stability Margin from Synchronized Phasor Measurements

An Adaptive Three-bus Power System Equivalent for Estimating Voltage Stability Margin from Synchronized Phasor Measurements An Adative Three-bus Power System Equivalent for Estimating oltage Stability argin from Synchronized Phasor easurements Fengkai Hu, Kai Sun University of Tennessee Knoxville, TN, USA fengkaihu@utk.edu

More information

General Linear Model Introduction, Classes of Linear models and Estimation

General Linear Model Introduction, Classes of Linear models and Estimation Stat 740 General Linear Model Introduction, Classes of Linear models and Estimation An aim of scientific enquiry: To describe or to discover relationshis among events (variables) in the controlled (laboratory)

More information

Understanding and Using Availability

Understanding and Using Availability Understanding and Using Availability Jorge Luis Romeu, Ph.D. ASQ CQE/CRE, & Senior Member C. Stat Fellow, Royal Statistical Society Past Director, Region II (NY & PA) Director: Juarez Lincoln Marti Int

More information

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies Online Aendix to Accomany AComarisonof Traditional and Oen-Access Aointment Scheduling Policies Lawrence W. Robinson Johnson Graduate School of Management Cornell University Ithaca, NY 14853-6201 lwr2@cornell.edu

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

Adaptive estimation with change detection for streaming data

Adaptive estimation with change detection for streaming data Adative estimation with change detection for streaming data A thesis resented for the degree of Doctor of Philosohy of the University of London and the Diloma of Imerial College by Dean Adam Bodenham Deartment

More information

Uncertainty Modeling with Interval Type-2 Fuzzy Logic Systems in Mobile Robotics

Uncertainty Modeling with Interval Type-2 Fuzzy Logic Systems in Mobile Robotics Uncertainty Modeling with Interval Tye-2 Fuzzy Logic Systems in Mobile Robotics Ondrej Linda, Student Member, IEEE, Milos Manic, Senior Member, IEEE bstract Interval Tye-2 Fuzzy Logic Systems (IT2 FLSs)

More information

KEY ISSUES IN THE ANALYSIS OF PILES IN LIQUEFYING SOILS

KEY ISSUES IN THE ANALYSIS OF PILES IN LIQUEFYING SOILS 4 th International Conference on Earthquake Geotechnical Engineering June 2-28, 27 KEY ISSUES IN THE ANALYSIS OF PILES IN LIQUEFYING SOILS Misko CUBRINOVSKI 1, Hayden BOWEN 1 ABSTRACT Two methods for analysis

More information

PERFORMANCE BASED DESIGN SYSTEM FOR CONCRETE MIXTURE WITH MULTI-OPTIMIZING GENETIC ALGORITHM

PERFORMANCE BASED DESIGN SYSTEM FOR CONCRETE MIXTURE WITH MULTI-OPTIMIZING GENETIC ALGORITHM PERFORMANCE BASED DESIGN SYSTEM FOR CONCRETE MIXTURE WITH MULTI-OPTIMIZING GENETIC ALGORITHM Takafumi Noguchi 1, Iei Maruyama 1 and Manabu Kanematsu 1 1 Deartment of Architecture, University of Tokyo,

More information

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting On the Role of Finite Queues in Cooerative Cognitive Radio Networks with Energy Harvesting Mohamed A. Abd-Elmagid, Tamer Elatt, and Karim G. Seddik Wireless Intelligent Networks Center (WINC), Nile University,

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process

Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process P. Mantalos a1, K. Mattheou b, A. Karagrigoriou b a.deartment of Statistics University of Lund

More information

Elliptic Curves and Cryptography

Elliptic Curves and Cryptography Ellitic Curves and Crytograhy Background in Ellitic Curves We'll now turn to the fascinating theory of ellitic curves. For simlicity, we'll restrict our discussion to ellitic curves over Z, where is a

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their

More information

Research of PMU Optimal Placement in Power Systems

Research of PMU Optimal Placement in Power Systems Proceedings of the 5th WSEAS/IASME Int. Conf. on SYSTEMS THEORY and SCIENTIFIC COMPUTATION, Malta, Setember 15-17, 2005 (38-43) Research of PMU Otimal Placement in Power Systems TIAN-TIAN CAI, QIAN AI

More information

COMMUNICATION BETWEEN SHAREHOLDERS 1

COMMUNICATION BETWEEN SHAREHOLDERS 1 COMMUNICATION BTWN SHARHOLDRS 1 A B. O A : A D Lemma B.1. U to µ Z r 2 σ2 Z + σ2 X 2r ω 2 an additive constant that does not deend on a or θ, the agents ayoffs can be written as: 2r rθa ω2 + θ µ Y rcov

More information

A New Method of DDB Logical Structure Synthesis Using Distributed Tabu Search

A New Method of DDB Logical Structure Synthesis Using Distributed Tabu Search A New Method of DDB Logical Structure Synthesis Using Distributed Tabu Search Eduard Babkin and Margarita Karunina 2, National Research University Higher School of Economics Det of nformation Systems and

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Multi-Operation Multi-Machine Scheduling

Multi-Operation Multi-Machine Scheduling Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job

More information

Numerical and experimental investigation on shot-peening induced deformation. Application to sheet metal forming.

Numerical and experimental investigation on shot-peening induced deformation. Application to sheet metal forming. Coyright JCPDS-International Centre for Diffraction Data 29 ISSN 197-2 511 Numerical and exerimental investigation on shot-eening induced deformation. Alication to sheet metal forming. Florent Cochennec

More information

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical

More information

An Analysis of TCP over Random Access Satellite Links

An Analysis of TCP over Random Access Satellite Links An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Vision Graph Construction in Wireless Multimedia Sensor Networks

Vision Graph Construction in Wireless Multimedia Sensor Networks University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Conference and Worksho Paers Comuter Science and Engineering, Deartment of 21 Vision Grah Construction in Wireless Multimedia

More information

Evaluating Process Capability Indices for some Quality Characteristics of a Manufacturing Process

Evaluating Process Capability Indices for some Quality Characteristics of a Manufacturing Process Journal of Statistical and Econometric Methods, vol., no.3, 013, 105-114 ISSN: 051-5057 (rint version), 051-5065(online) Scienress Ltd, 013 Evaluating Process aability Indices for some Quality haracteristics

More information

ASSESSMENT OF NUMERICAL UNCERTAINTY FOR THE CALCULATIONS OF TURBULENT FLOW OVER A BACKWARD FACING STEP

ASSESSMENT OF NUMERICAL UNCERTAINTY FOR THE CALCULATIONS OF TURBULENT FLOW OVER A BACKWARD FACING STEP Submitted to Worsho on Uncertainty Estimation October -, 004, Lisbon, Portugal ASSESSMENT OF NUMERICAL UNCERTAINTY FOR THE CALCULATIONS OF TURBULENT FLOW OVER A BACKWARD FACING STEP ABSTRACT Ismail B.

More information

GIVEN an input sequence x 0,..., x n 1 and the

GIVEN an input sequence x 0,..., x n 1 and the 1 Running Max/Min Filters using 1 + o(1) Comarisons er Samle Hao Yuan, Member, IEEE, and Mikhail J. Atallah, Fellow, IEEE Abstract A running max (or min) filter asks for the maximum or (minimum) elements

More information

Linear diophantine equations for discrete tomography

Linear diophantine equations for discrete tomography Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,

More information

Controllability and Resiliency Analysis in Heat Exchanger Networks

Controllability and Resiliency Analysis in Heat Exchanger Networks 609 A ublication of CHEMICAL ENGINEERING RANSACIONS VOL. 6, 07 Guest Editors: Petar S Varbanov, Rongxin Su, Hon Loong Lam, Xia Liu, Jiří J Klemeš Coyright 07, AIDIC Servizi S.r.l. ISBN 978-88-95608-5-8;

More information

Fig. 21: Architecture of PeerSim [44]

Fig. 21: Architecture of PeerSim [44] Sulementary Aendix A: Modeling HPP with PeerSim Fig. : Architecture of PeerSim [] In PeerSim, every comonent can be relaced by another comonent imlementing the same interface, and the general simulation

More information

Use of Transformations and the Repeated Statement in PROC GLM in SAS Ed Stanek

Use of Transformations and the Repeated Statement in PROC GLM in SAS Ed Stanek Use of Transformations and the Reeated Statement in PROC GLM in SAS Ed Stanek Introduction We describe how the Reeated Statement in PROC GLM in SAS transforms the data to rovide tests of hyotheses of interest.

More information

DETC2003/DAC AN EFFICIENT ALGORITHM FOR CONSTRUCTING OPTIMAL DESIGN OF COMPUTER EXPERIMENTS

DETC2003/DAC AN EFFICIENT ALGORITHM FOR CONSTRUCTING OPTIMAL DESIGN OF COMPUTER EXPERIMENTS Proceedings of DETC 03 ASME 003 Design Engineering Technical Conferences and Comuters and Information in Engineering Conference Chicago, Illinois USA, Setember -6, 003 DETC003/DAC-48760 AN EFFICIENT ALGORITHM

More information

An Outdoor Recreation Use Model with Applications to Evaluating Survey Estimators

An Outdoor Recreation Use Model with Applications to Evaluating Survey Estimators United States Deartment of Agriculture Forest Service Southern Research Station An Outdoor Recreation Use Model with Alications to Evaluating Survey Estimators Stanley J. Zarnoch, Donald B.K. English,

More information

Optimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment

Optimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment Neutrosohic Sets and Systems Vol 14 016 93 University of New Mexico Otimal Design of Truss Structures Using a Neutrosohic Number Otimization Model under an Indeterminate Environment Wenzhong Jiang & Jun

More information

Modeling Residual-Geometric Flow Sampling

Modeling Residual-Geometric Flow Sampling 1 Modeling Residual-Geometric Flow Samling Xiaoming Wang, Xiaoyong Li, and Dmitri Loguinov Abstract Traffic monitoring and estimation of flow arameters in high seed routers have recently become challenging

More information

Research of power plant parameter based on the Principal Component Analysis method

Research of power plant parameter based on the Principal Component Analysis method Research of ower lant arameter based on the Princial Comonent Analysis method Yang Yang *a, Di Zhang b a b School of Engineering, Bohai University, Liaoning Jinzhou, 3; Liaoning Datang international Jinzhou

More information

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION O P E R A T I O N S R E S E A R C H A N D D E C I S I O N S No. 27 DOI:.5277/ord73 Nasrullah KHAN Muhammad ASLAM 2 Kyung-Jun KIM 3 Chi-Hyuck JUN 4 A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST

More information

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment

More information

1-way quantum finite automata: strengths, weaknesses and generalizations

1-way quantum finite automata: strengths, weaknesses and generalizations 1-way quantum finite automata: strengths, weaknesses and generalizations arxiv:quant-h/9802062v3 30 Se 1998 Andris Ambainis UC Berkeley Abstract Rūsiņš Freivalds University of Latvia We study 1-way quantum

More information

NUMERICAL AND THEORETICAL INVESTIGATIONS ON DETONATION- INERT CONFINEMENT INTERACTIONS

NUMERICAL AND THEORETICAL INVESTIGATIONS ON DETONATION- INERT CONFINEMENT INTERACTIONS NUMERICAL AND THEORETICAL INVESTIGATIONS ON DETONATION- INERT CONFINEMENT INTERACTIONS Tariq D. Aslam and John B. Bdzil Los Alamos National Laboratory Los Alamos, NM 87545 hone: 1-55-667-1367, fax: 1-55-667-6372

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

Analysis of M/M/n/K Queue with Multiple Priorities

Analysis of M/M/n/K Queue with Multiple Priorities Analysis of M/M/n/K Queue with Multile Priorities Coyright, Sanjay K. Bose For a P-riority system, class P of highest riority Indeendent, Poisson arrival rocesses for each class with i as average arrival

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

Diverse Routing in Networks with Probabilistic Failures

Diverse Routing in Networks with Probabilistic Failures Diverse Routing in Networks with Probabilistic Failures Hyang-Won Lee, Member, IEEE, Eytan Modiano, Senior Member, IEEE, Kayi Lee, Member, IEEE Abstract We develo diverse routing schemes for dealing with

More information

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete

More information

MODEL-BASED MULTIPLE FAULT DETECTION AND ISOLATION FOR NONLINEAR SYSTEMS

MODEL-BASED MULTIPLE FAULT DETECTION AND ISOLATION FOR NONLINEAR SYSTEMS MODEL-BASED MULIPLE FAUL DEECION AND ISOLAION FOR NONLINEAR SYSEMS Ivan Castillo, and homas F. Edgar he University of exas at Austin Austin, X 78712 David Hill Chemstations Houston, X 77009 Abstract A

More information

Design Constraint for Fine Grain Supply Voltage Control LSI

Design Constraint for Fine Grain Supply Voltage Control LSI ASP-DAC 211 Designer s Forum Session 8D-3: State-of-The-Art SoCs and Design Methodologies Design Constraint for Fine Grain Suly Voltage Control LSI January 28, 211 Atsuki Inoue Platform Technologies Laboratories

More information

Characteristics of Beam-Based Flexure Modules

Characteristics of Beam-Based Flexure Modules Shorya Awtar e-mail: shorya@mit.edu Alexander H. Slocum e-mail: slocum@mit.edu Precision Engineering Research Grou, Massachusetts Institute of Technology, Cambridge, MA 039 Edi Sevincer Omega Advanced

More information

Calculation of MTTF values with Markov Models for Safety Instrumented Systems

Calculation of MTTF values with Markov Models for Safety Instrumented Systems 7th WEA International Conference on APPLIE COMPUTE CIENCE, Venice, Italy, November -3, 7 3 Calculation of MTTF values with Markov Models for afety Instrumented ystems BÖCÖK J., UGLJEA E., MACHMU. University

More information

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm Gabriel Noriega, José Restreo, Víctor Guzmán, Maribel Giménez and José Aller Universidad Simón Bolívar Valle de Sartenejas,

More information

Factors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doped Fiber Amplifier

Factors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doped Fiber Amplifier Australian Journal of Basic and Alied Sciences, 5(12): 2010-2020, 2011 ISSN 1991-8178 Factors Effect on the Saturation Parameter S and there Influences on the Gain Behavior of Ytterbium Doed Fiber Amlifier

More information

Hidden Predictors: A Factor Analysis Primer

Hidden Predictors: A Factor Analysis Primer Hidden Predictors: A Factor Analysis Primer Ryan C Sanchez Western Washington University Factor Analysis is a owerful statistical method in the modern research sychologist s toolbag When used roerly, factor

More information

POWER DENSITY OPTIMIZATION OF AN ARRAY OF PIEZOELECTRIC HARVESTERS USING A GENETIC ALGORITHM

POWER DENSITY OPTIMIZATION OF AN ARRAY OF PIEZOELECTRIC HARVESTERS USING A GENETIC ALGORITHM International Worksho SMART MATERIALS, STRUCTURES & NDT in AEROSPACE Conference NDT in Canada 11-4 November 11, Montreal, Quebec, Canada POWER DENSITY OPTIMIZATION OF AN ARRAY OF PIEZOELECTRIC HARVESTERS

More information

Checkpointing algorithms and fault prediction

Checkpointing algorithms and fault prediction hal-78833, version - 4 Feb 23 Checkointing algorithms and fault rediction Guillaume Auy, Yves Robert, Frédéric Vivien, Dounia Zaidouni RESEARCH REPORT N 8237 February 23 Project-Team ROMA ISSN 249-6399

More information

Physical based Schottky barrier diode modeling for THz applications

Physical based Schottky barrier diode modeling for THz applications Downloaded from orbit.dtu.dk on: Jan 6, 18 Physical based Schottky barrier diode modeling THz alications Yan, Lei; Krozer, iktor; Michaelsen, Rasmus Schandorh; Durhuus, Torsten; Johansen, Tom Keinicke

More information

Finite Mixture EFA in Mplus

Finite Mixture EFA in Mplus Finite Mixture EFA in Mlus November 16, 2007 In this document we describe the Mixture EFA model estimated in Mlus. Four tyes of deendent variables are ossible in this model: normally distributed, ordered

More information