Research of concurrency control protocol based on the main memory database

Size: px
Start display at page:

Download "Research of concurrency control protocol based on the main memory database"

Transcription

1 Research of concurrency control protocol based on the man memory database Abstract Yonghua Zhang * Shjazhuang Unversty of economcs, Shjazhuang, Shjazhuang, Chna Receved 1 October 2014, The concurrent access of data can cause the nconsstency. How to control t effcently s one of the queston of the frst mportance n the database applcaton system. In ths paper a management mechansm called dynamc mult-gran lock and a related concurrency control protocol were gven. Keywords: concurrency access, management mechansm, dynamc mult-gran lock, protocol 1 Concurrency control overvew In the database system, the transactons can be executed serally one by one, that s, there s only one transacton runnng each tme and the other transactons have to wat untl the end of that transacton. In order to fully utlze the system resources and develop the feature of database shared resources, the multple transactons to be executed n parallel should be allowed. In the applcaton system, the process for the multple users to concurrently access the same data s called concurrent access of the data. When the multple users access the database concurrently, there would be the stuaton of multple transactons accessng the same data at the same tme. If no control has been appled n the concurrent operaton, t s possble to access the wrong data, whch would destroy the database consstency. Therefore, the database management system should provde the concurrency control mechansm. When the multple users access the database concurrently, there would be the stuaton of multple transactons accessng the same data at the same tme. If no control has been appled on the concurrent operaton, t s possble to access the wrong data, whch would destroy database consstency. Therefore, the database management system should provde the concurrency control mechansm. For the man memory database system, the data lockng overhead and processng overhead are almost the same. The access speed of memory s much faster than that of the dsk, whch has sgnfcantly reduced the transacton executon tme than the dsk database; correspondngly, the lock occupaton tme has been shortened dramatcally. Therefore, the essental advantages and necessty of fne graned lockng have been lost. Hence the greater gran lock s generally adopted n the man memory database such as relatonshp level or database level, whch has undoubtedly reduced the complexty of concurrency mechansm and the burden n the system, thereby mproves the overall system performance. 2 Concurrent executons of transactons If the concurrent executons of transactons are not reasonably scheduled, the transactonal solaton wll be destroyed n causng the nconsstency of the data storage area. Generally speakng, the concurrency control s not requred f the access data set of the concurrent transactons s not correlated or ntersected, or the wrte set of transactons and the readng set of the other transactons are not ntersected. However, the data storage area s a shared resource. The sharng way of the storage nformaton s to allow the multple user access n modfyng the same data. That means the relatons between the transactons are much close and the access data s ntersected to a great extent. For nstance, f an update operaton and an operaton are conducted concurrently, the wrtng and readng data wll be contradcted. If two or more updates are conducted concurrently, the update nformaton may be lost. Therefore, no correct access data s obtaned wthout the correspondng concurrent access control method. How to control the concurrent access of data effcently s one of the queston of the frst mportance n the database applcaton system. Defnton 1: The defnton of the schedule S s based on the transacton set T={T 1,T 2,...,T n}, whch t s an operaton seres of the multple transactons. Defnton 2: In the schedule S, the operatons of each transacton are not overlapped (namely, n sequence); t wll be the seral schedule. Defnton 3: The schedule S s seralzable. When the conflct S s equvalent to a seral schedule, the seral schedule s generally called conflct equvalence seralzablty. The basc functon of a concurrent controller (or scheduler) s to generate a seral schedule n runnng the transactons. In the man memory database system, the majorty of the concurrent control protocols are based on the seralzable theory. The concurrent control protocol s used to control the schedule of the data of whch ts major * Correspondng author s e-mal: @qq.com 141

2 objectve s to mantan the data consstency and provde data lock and s appled to record the dstrbuton status of the maxmzed concurrency. the data lock. The status of the data lock ncludes read In some cases, t s able to approprately loosen up the locked, wrte locked and unlocked. The data lock has requrements of consstency. The man memory database recorded all the transactons of the locked data. The locked s the shared data nherent n the memory. Whle the data transactons are dvded nto read lock holder and transactons are conducted concurrently n the dfferent wrte lock holder. At the same tme, t wll record all of the threads, t may cause the conflct to access the same data blocked wat transacton lsts n applyng the data lock. In object n the man memory database. The concurrent the lock manager, there s a compatblty lst. When the control protocol s a strategy to solve the conflcts between transacton lock s appled, the lock manager wll the transactons. determne whether to block the lock applcant accordng to The common conflctng modes are stated: the compatblty lst; when the transacton lock s released, read-wrte conflct and wrte wrte conflct. the transacton wll be aroused to obtan the lock when the blocked transacton s allowed to obtan the lock. In terms read-wrte conflct: To access the same data object of the manager, the transacton wll lock the data tem at may cause the conflcts whle a transacton s runnng the the logcal level. The manager wll schedule the gran from read operatons and another transacton s runnng the the dynamcs of the lock. When the conflcts are decreased, wrte operaton. t s suggested to use the table lock; when the conflcts are wrte-wrte conflct: To access the same data object enhanced, the tuple lock s appled. may cause the conflcts whle a transacton s runnng the There s a close relatonshp between the wrte operaton and another transacton s also runnng mplementaton of MMDB lock manager and the database the wrte operaton. organzaton. The MMDB system s composed of data and In the man memory database, to resolve the conflct metadata. Each segment wll correspond to a table n the based on the concurrent control protocol manly depend on database. It s known that there s a drect correlaton two strateges: between the metadata and segment n the table lock, Wat: termnate the conflctng operaton caused by one between the metadata and partton n the tuple lock. transacton and keep the pendng state untl the operaton Whle the transacton submts the lock request and of another transacton s completed. For the concurrent MML receves the lock requests, t needs to dscover the transacton control study n the man memory database, lock gran nformaton n the correspondng segment three knds of watng strateges are derved: control block that wll be converted nto the table lock; f 1) No wat: the watng transacton s mmedately the tuple lock s detected, the tuple lock s appled. If the ended nstead of the completon of another transacton transacton sends the table lock request, the table lock s operaton. appled wthout beng refned. 2) Wound wat: accordng to the arrval tme of each Dynamc Reducton of Lock Gran transacton, the transacton n runnng the data wll be The general condton of the dynamc reducton of lock ended when the transacton n obtanng the data s arrved gran s stated n the followng part. When the lock gran s n an earler way; otherwse, the transacton n obtanng tuple lock, the lock gran nformaton can be set as the table the data wll be ended. lock when all the locks are compatble. Accordng to the 3) Wat de: accordng to the arrval tme of each transacton, the transacton contnues to wat when the transacton nformaton n holdng the lock, t s able to set transacton n obtanng the data s arrved n an earler way. the control block of the table lock. Otherwse, the transacton s ended. Dynamc Increase of Lock Gran Revert: undo the conflctng operaton. When the Whle ncreasng the lock gran, t needs to record the transacton s reset, t s able to go back to the ntal stage. tuple lock requests of the transacton n the actve state. When t needs to use the tuple lock, the memorzed lock 3 Implementaton of man memory database lock wll be converted nto the real tuple lock. In addton, the lock gran nformaton s set as the tuple lock n the table. There are two major approaches to mprove the The locked gran s closely correlated wth the system performance n MMDB. Frst of all, change the database concurrency and the overhead of the concurrent control. In storage structure, put the tuple data and data together, general, the locked gran s greater wth fewer locked acheve a drect access of the metadata and decrease the objects, smaller selectvty, lower concurrency and smaller overhead of the metadata; secondly, the dynamc multgran lock mechansm s appled n the concurrent more locked objects, greater selectvty, hgher overhead; on the contrary, the locked gran s smaller wth operaton. In the lock mechansm, t s requred to obtan concurrency and greater overhead. the correspondng lock before the transactons access the At the logcal level, the dstrbuted database s an entty. data object. There are two basc types of locks: read lock At the physcal level, the dstrbuted database s stored n (shared lock) and wrte lock (exclusve lock). Multple the vared physcal nodes. Therefore, the chef and prompt transactons can share the read lock of the same data rather ssue s to effectvely conduct the concurrent control of the than the wrte lock of the same data. We have adopted the data n the database applcaton system. The current task s management mechansm of the dynamc mult-gran lock to establsh the relable and feasble concurrent control n our research system. The lock manager has developed a strategy n the remote database. 142

3 4 Self-control lock 4.1 OVERVIEW OF SELF-CONTROL LOCK The so-called self-control lock s to dscard the lock manager whle the lock s appled and released through the shared memory operatons. Snce there s no lock management progress, t s able to avod the low effcency n the management process. All the requests and releases are drectly operated n the shared memory whle the ndex does not requre ntra-process communcaton. mechansm. In the tradtonal lock mechansm, there s the correspondng lock manager for each lock to conduct the relevant operatons rather than usng the key component. The lock operaton code can be ndependently conducted and t s able to ensure the specfc LCB consstency through the key component. The communcaton effcency s much hgher than that of nter-process communcaton Recovery When the dfferent records of the same page are locked through the transactons at the dfferent nodes, t s requred to obtan the renewal and cancellng nformaton so as to ensure that the transacton s not qutted for the node falure. To renew the record s temporary whle to cancel the record s to store the nformaton. For nstance, before the record s transferred to another node n one page, the correspondng transacton wll be recorded n the log on account of the renewal and cancellng nformaton for the processed database object. In order to ensure that the renewal record of the transacton s recorded before t s transferred; the transacton can hold a short-term lock untl the renewal nformaton s recorded. FIGURE 1 Database System Structure In terms of the self-lock, the data tems are correlated, namely each data tem corresponds to a LCB. A LCB wll record the current lock types and two transacton tables that one s used to record the current transacton n holdng the lock whle the other s used to record the transacton n watng the lock. Seemngly, there s no bg dfference for the mechansm and the mult-processor developers to realze the semaphore. In fact, there are the bg dfferences: frstly, t s dfferent from the semaphore, the database lock must be controlled so as to ensure the falure atomcty of the transacton; secondly, the database lock s also used to support the other lockng modes other than the shared lock and exclusve lock (Fgure 1). 4.2 IMPLEMENTATION OF SELF-LOCK Operaton of self-lock In vew of the applcaton condtons of the lock, a request ncludes the name and type of the lock. After the hash processng of the name of the lock, t wll be converted nto the correspondng lock control block (LCB). All the updates are conducted through a key component. If the requested type s compatble wth the current type of LCB and there s no conflctng wat process, the record about the process and the request type s added n the holder lsts and t s successfully locked. Otherwse, the record s added nto the wat process lsts and the system wll return back the unapproved nformaton to the requester. The strategy of releasng the lock s smlar. Whle fndng the correspondng LCB, the correspondng record wll be deleted n the holder lst. If there are the compatble lock requests n the watng process, the request wll be approved. The strategy s smlar wth the tradtonal lock Ensure the falure atomcty of the locked space Due to the nfluence of the consstency protocol, LCB s appeared n one node. Whle two transactons at the dfferent nodes obtan the same compatble lock, LCB wll be located at the node n obtanng the lock. Therefore, when one node s broke, some nformaton of the transacton wll be lost rather than all of the LCB. In order to ensure the falure atomcty of the transacton, the measures are taken: before the transacton obtans the lock, t needs to record the transacton dentfer (Tm); n addton, before the lock s requested, t wll temporarly record the name of the lock and apply the transacton s Tm. These logs are used to ensure the consstency of the space whle the node s faled Relevant Performance Analyss The self-lock request can be drectly appled to the shared memory n greatly mprovng ts effcency. In the SD and SM database, the mechansm of the hgh lock gran s smlar. Through the nterrupton rate evaluaton of the large-scale share memory mult-processor system, t s seen that for the general lockng condton, CL s overhead s ncreased wth the conflctng lnear growth. The nterrupton rate s a constant. For the hot lock, the nterrupton performance s almost an order of magntude greater than that of CL. 5 Recoverable user-level spn lock What s spn lock? It s a lock mechansm to protect the shared resources. When the conflcts are reduced, the effcency of the spn lock s much hgher than that of the semaphore. Spn lock s busy watng process n consumng the CPU resources. However, t wll not cause 143

4 the sleepng of the thread and the user state wll not be long for the lock request, t needs to call the cleanng swtched to the system status. Spn lock s appled when process n releasng the lock or conductng the the lock hold-up tme s shorter wth more CPU resources. correspondng recovery operaton. In order to mplement the spn lock, t needs to set the spnnng tmes and prevent the endless loop. In terms of 5.2 Relevant Performance of spn lock the recursve call, the spn lock s forbdden of whch t wll trgger the dead lock. For many spn locks, the atomc Snce the spn lock has escaped the system, ts operaton operaton s not avalable n obtanng the lock and effcency s hgher than that of the semaphore. If t s regsterng the holdng nformaton. When the key unable to correctly get the holder nformaton, t needs to component s termnated or the processng speed s slow restart the system and recover the nformaton when the down, t s unable to correctly determne the holder. It s holdng process s ended. It s a huge overhead n able to conduct the recoverable user-level spn lock snce overrdng the orgnal advantages of spn lock. Based on t s able to correctly determne the nformaton of the the above algorthms, t has no need to restart the system, holder of the lock and be appled to the re-nstallaton of greatly mprovng the processng effcency based on the the protected data tem and the subsequent lock release dead process and gvng full play to the merts of spn lock. operaton. In ths way, the system rebootng s avoded. 6 Proposal of the protocol 5.1 Implementaton of the recoverable spn lock Frst of all, t needs to add a data structure n each process to record the requred lock. It s called want doman. In ths way, t s helpful to determne the process set n holdng the lock. Durng the process of determnng the holder, the lock may be requested by the other processes n causng the uncertanty of the process set. Therefore, t needs to add a semaphore for the lock n determnng the holder. If t s n progress, the other processes may gve up the request of the lock and want doman. The pseudo code of the correspondng data structure s stated as follows: struct SafeSpnLock{ nt lock; ProcessID owner; nt cleanup_n_progress; }; struct LockAccessRecord{ SafeSpnLock*wants; }; The correspondng cleanng process s stated as follows: Set the lock s cleanup_n_progress to prevent the mssng of the want doman, and get the lock n the cleanng process. 1) Decde all the possble processes n holdng or obtanng the lock 2) Conduct the loop operaton untl ether of the two condtons s satsfed: A. The status of the spn lock becomes clear n beng dle or held by the actve process. B. The process set s empty. The lock s not held by any actve process. If A s avalable, the locked status s mmedately determned. Otherwse, t has to wat for a perod of tme. Some processes are excluded and reorganzed. If A s not satsfed for all the tme, B s fnally satsfed. The lock may be dle or beng held by a dead process. If the lock holder nformaton s no_progress n the dead process, t s known that the process s ended n obtanng the lock and regsterng the nformaton, or releasng the lock. Under such condtons, the lock wll be released at ease; f the holder nformaton s known, t can conduct the recovery operaton and release the lock agan. When there s the deal process or the watng tme s too Accordng to the current research on the man memory database and the characterstcs of man memory database, the matchng concurrent control protocol s proposed n the paper. The protocol model s ntroduced to ensure the seralzablty of the transacton and preventng the other transacton to read the drty data wthout delverng the transacton. Tradtonally, the lock based on the concurrent control protocol ncludes read lock and wrte lock. The share and non-share relatons are appled between the locks. In ths way, there are three knds of the blockng approaches n the system: wrte block read block wrte block In the system model, there s a new relaton between read lock and wrte lock, that s to say the orderly sharng relaton n cancellng the above mentoned frst and thrd blocks. For nstance: n order to cancel the read-wrte block, the other transacton t can stll conduct the wrte lock on the data object when the transacton t j has conducted the read lock on a data object. At ths tme, t s known to be the orderly sharng relaton between t read lock and t j wrte lock. In order to ensure the seralzablty of the transacton, the desgned protocol shall conform to the followng rules: Rule 1: If there s the orderly sharng relaton between the obtaned lock of the transacton t and the holdng lock of the transacton t j, The correspondng t operaton s conducted untl the correspondng t operaton s completed (controlled by the schedulng procedure). t s submtted untl the endng/submsson of t j. The endng of a transacton wll cause the consecutve endng of the transactons n readng the drty data, whch t wll have a great nfluence to the system performance. For the second blockng approach, the orderly sharng relaton s not avalable n our establshed lockng model. Based on the protocol, the transacton can just read the submtted data. Suppose T t1, t2,..., T n s the transacton set of D t 1,2,, n s the access the system ndex and 144

5 set of the transacton t. As well, represents that conducts the read lock on the data object x ED( t ) ; represents that t conducts the wrte lock on x; represents there s the orderly sharng relaton between the holdng read lock of x based on t and the wrte lock of x based on t j. PRI(t ) represents the prorty of the transacton t. The protocol can be brefly descrbed as: when the transacton t T, RL x t,,, WL x, t OS RL x t t T s mplemented, x D( t ), t wll conduct the lockng operaton on the x. In the submttng or endng process, t wll release the holdng locks. When t tres to conduct the wrte lock on x, t can stll obtan the wrte lock on the data object f x s read or wrte locked by the other transactons. As well,, j, j or OS RL x, t j, OS RL x, t,. When t s ready to be submtted, t stll keeps the watng status when Rule 1 s not satsfed or the date of t s not expred. Otherwse, t wll be submtted when Rule 1 s satsfed. If the date of t j s expred, t has the top prorty. It wll be submtted through the transactons when t s ended prevously or has the OS relatons. When t tres to conduct the wrte lock on x, the transacton t can stll obtan the read lock on the data object when x s conducted the read lock through another transacton t j. If x s read locked by t, the data object s wrte blocked through the other transactons, that s to say. PRI t PRI t j If, t can just obtan the read lock when t j s submtted or ended. If PRI t PRI t j, t needs to estmate whether the transacton t can be completed at the deadlne (to judge whether t s completed at the deadlne, t can compare the References present tme wth the flled deadlne of the transacton and the runnng tme estmates). If t j can be completed at the deadlne, t j wll be ended and t wll be allowed to conduct the read lock on x; f t cannot be completed at the deadlne, t wll be ended. It s seen that the ntroducton of the orderly sharng relaton can greatly reduce the blockng stuaton n the system, but the submsson of the current transacton may be postponed. The major desgn objectve of ARTDEIS s to satsfy the tme lmt of the ntatve real-tme transacton rather than the response speed. Therefore, the delay of the submsson does not go aganst ts major desgn prncple or stop the read/wrte operaton of the other transactons. When some hgh prorty transacton tres to end a low prorty transacton, t wll estmate whether the hgh prorty transacton can be completed at the deadlne so that t can prevent the runnng transacton beng ended by the other endng transacton (It s called wastng end). Before the transacton s submtted, all of the databases n conductng the wrte operaton are locked. Therefore, the other transactons cannot read the uncommtted data so as to ensure the seralzablty of the transacton. 7 Summary and nnovatons In ths paper, the author nvestgates the concurrent control mechansm n the tradtonal database system and analyzes the general control approaches. Based on the characterstcs of the man memory database, the matchng concurrent control protocol s proposed to ensure the seralzablty of the transacton. [1] Wang H, Pan Z 2004 Analyss of Data Structure n Man Memory Database Modern Electroncs Technque 27(3) [2] Ma H, Yang B, Yao J 2003 Appled Mult-Dmensonal Index Structure n the Man Memory Database System Computer Engneerng and Applcatons 39(29) [3] Lu Y, Lao G 2003 Appled Recovery System for Real-Tme Man Memory Database Journal of Chnese Computer System 24(3) [4] Wang R, Huang Q, Tang L, L W, Chen Q, Long K 2006 Memory Management of Embedded TCP/IP Protocol Mcrocomputer Informaton [5] Zhou Y 2010 Improved Lockng Protocol n Man Memory Database Computer Systems Applcatons 19(12) [6] Zhang Y, Lan L 2012 Concurrent Access Algorthms Based on the Mult-Gran Lockng Transactons Mcrocomputer & Its Applcatons 05 [7] Sang C 2013 Research on Consstency of Mult-Tenant Database [D]Shandong Unversty 2013 [8] Pands I, Johnson R, Hardavellas N, Alamak A 2010 Data Orented Transacton Executon VLDB [9] Curno C, Jones E P C, Madden S, Balakrshnan H 2011 Workload Aware Database Montorng and Consoldaton SIGMOD [10] Zheng Y, Sang C, Meng X, L Q Tenant Orented Lock Granularty Adjustment Strategy n the Shared Storage Mult-tenant Database ICNDS JDCTA Author, , Shjazhuang, Chna. Current poston, grades: Drector, Engneer n Shjazhuang Unversty Of Economcs. Unversty studes: Shjazhuang Unversty Of Economcs and Xdan Unversty. Scentfc nterest: database and database concurrency control, nternet, data encrypton. Publcatons: 11 papers. 145

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

Real-Time Process Scheduling

Real-Time Process Scheduling Real-Tme Process Schedulng ktw@cse.ntu.edu.tw (Real-Tme and Embedded Systems Laboratory) Independent Process Schedulng Processes share nothng but CPU Papers for dscussons: C.L. Lu and James. W. Layland,

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process Dsadvantages of cyclc TDDB47 Real Tme Systems Manual scheduler constructon Cannot deal wth any runtme changes What happens f we add a task to the set? Real-Tme Systems Laboratory Department of Computer

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Checkng and Testng in Nokia RMS Process

Checkng and Testng in Nokia RMS Process An Integrated Schedulng Mechansm for Fault-Tolerant Modular Avoncs Systems Yann-Hang Lee Mohamed Youns Jeff Zhou CISE Department Unversty of Florda Ganesvlle, FL 326 yhlee@cse.ufl.edu Advanced System Technology

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

= (2) T a,2 a,2. T a,3 a,3. T a,1 a,1

= (2) T a,2 a,2. T a,3 a,3. T a,1 a,1 A set of tools for buldng PostgreSQL dstrbuted databases n bomedcal envronment. M. Cavaller, R. Prudentno, U. Pozzol, G. Ren IRCCS E. Medea, Bosso Parn (LC), Italy. E-mal: gren@bp.lnf.t Abstract PostgreSQL

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA ) February 17, 2011 Andrew J. Hatnay ahatnay@kmlaw.ca Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs

More information

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Cross-Domain Authorization Management Model for Multi- Levels Hybrid Cloud Computing

Cross-Domain Authorization Management Model for Multi- Levels Hybrid Cloud Computing Internatonal Journal of Securty and Its Applcatons, pp.343-352 http://dx.do.org/10.14257/sa.2015.9.12.33 Cross-Doman Authorzaton Management Model for Mult- Levels Hybrd Cloud Computng L Na 1, Dong Yun-We

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna lustrve@gmal.com, yshen@cs.sjtu.edu.cn

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Some literature also use the term Process Control

Some literature also use the term Process Control A Formal Approach for Internal Controls Complance n Busness Processes Koumars Namr 1, Nenad Stojanovc 2 1 SAP Research Center CEC Karlsruhe, SAP AG, Vncenz-Preßntz-Str.1 76131 Karlsruhe, Germany Koumars.Namr@sap.com

More information

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent

More information

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Power Low Modified Dual Priority in Hard Real Time Systems with Resource Requirements

Power Low Modified Dual Priority in Hard Real Time Systems with Resource Requirements Power Low Modfed Dual Prorty n Hard Real Tme Systems wth Resource Requrements M.Angels Moncusí, Alex Arenas {amoncus,aarenas}@etse.urv.es Dpt d'engnyera Informàtca Matemàtques Unverstat Rovra Vrgl Campus

More information

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems 1 Mult-Resource Far Allocaton n Heterogeneous Cloud Computng Systems We Wang, Student Member, IEEE, Ben Lang, Senor Member, IEEE, Baochun L, Senor Member, IEEE Abstract We study the mult-resource allocaton

More information

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management

More information

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr Proceedngs of the 41st Internatonal Conference on Computers & Industral Engneerng BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK Yeong-bn Mn 1, Yongwoo Shn 2, Km Jeehong 1, Dongsoo

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

Dynamic Fleet Management for Cybercars

Dynamic Fleet Management for Cybercars Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

A High-confidence Cyber-Physical Alarm System: Design and Implementation

A High-confidence Cyber-Physical Alarm System: Design and Implementation A Hgh-confdence Cyber-Physcal Alarm System: Desgn and Implementaton Longhua Ma 1,2, Tengka Yuan 1, Feng Xa 3, Mng Xu 1, Jun Yao 1, Meng Shao 4 1 Department of Control Scence and Engneerng, Zhejang Unversty,

More information

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks

An Adaptive Cross-layer Bandwidth Scheduling Strategy for the Speed-Sensitive Strategy in Hierarchical Cellular Networks An Adaptve Cross-layer Bandwdth Schedulng Strategy for the Speed-Senstve Strategy n erarchcal Cellular Networks Jong-Shn Chen #1, Me-Wen #2 Department of Informaton and Communcaton Engneerng ChaoYang Unversty

More information

Tuition Fee Loan application notes

Tuition Fee Loan application notes Tuton Fee Loan applcaton notes for new part-tme EU students 2012/13 About these notes These notes should be read along wth your Tuton Fee Loan applcaton form. The notes are splt nto three parts: Part 1

More information

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol

An Ad Hoc Network Load Balancing Energy- Efficient Multipath Routing Protocol 246 JOURNA OF SOFTWAR, VO. 9, NO. 1, JANUARY 2014 An Ad Hoc Network oad alancng nergy- ffcent Multpath Routng Protocol De-jn Kong Shanx Fnance and Taxaton College, Tayuan, Chna mal: dejnkong@163.com Xao-lng

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

Overview of monitoring and evaluation

Overview of monitoring and evaluation 540 Toolkt to Combat Traffckng n Persons Tool 10.1 Overvew of montorng and evaluaton Overvew Ths tool brefly descrbes both montorng and evaluaton, and the dstncton between the two. What s montorng? Montorng

More information

Network Aware Load-Balancing via Parallel VM Migration for Data Centers

Network Aware Load-Balancing via Parallel VM Migration for Data Centers Network Aware Load-Balancng va Parallel VM Mgraton for Data Centers Kun-Tng Chen 2, Chen Chen 12, Po-Hsang Wang 2 1 Informaton Technology Servce Center, 2 Department of Computer Scence Natonal Chao Tung

More information

Computer Networks 55 (2011) 3503 3516. Contents lists available at ScienceDirect. Computer Networks. journal homepage: www.elsevier.

Computer Networks 55 (2011) 3503 3516. Contents lists available at ScienceDirect. Computer Networks. journal homepage: www.elsevier. Computer Networks 55 (2011) 3503 3516 Contents lsts avalable at ScenceDrect Computer Networks journal homepage: www.elsever.com/locate/comnet Bonded defct round robn schedulng for mult-channel networks

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

Period and Deadline Selection for Schedulability in Real-Time Systems

Period and Deadline Selection for Schedulability in Real-Time Systems Perod and Deadlne Selecton for Schedulablty n Real-Tme Systems Thdapat Chantem, Xaofeng Wang, M.D. Lemmon, and X. Sharon Hu Department of Computer Scence and Engneerng, Department of Electrcal Engneerng

More information

QoS in the Linux Operating System. Technical Report

QoS in the Linux Operating System. Technical Report Unverstät Karlsruhe (H) Insttut für elematk QoS n the Lnux Operatng System echncal Report Marc Bechler and Hartmut Rtter Insttut für elematk Fakultät für Informatk Unverstät Karlsruhe (H) E-Mal: [mbechler

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

A heuristic task deployment approach for load balancing

A heuristic task deployment approach for load balancing Xu Gaochao, Dong Yunmeng, Fu Xaodog, Dng Yan, Lu Peng, Zhao Ja Abstract A heurstc task deployment approach for load balancng Gaochao Xu, Yunmeng Dong, Xaodong Fu, Yan Dng, Peng Lu, Ja Zhao * College of

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Research of Network System Reconfigurable Model Based on the Finite State Automation

Research of Network System Reconfigurable Model Based on the Finite State Automation JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang

More information

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton

More information

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy

More information

Mathematical Framework for A Novel Database Replication Algorithm

Mathematical Framework for A Novel Database Replication Algorithm I.J.Modern Educaton and Computer Scence, 203, 9, -0 Publshed Onlne October 203 n MECS (http://www.mecs-press.org/) DOI: 0.585/jmecs.203.09.0 Mathematcal Framework for A Novel Database Replcaton Algorthm

More information

PEER REVIEWER RECOMMENDATION IN ONLINE SOCIAL LEARNING CONTEXT: INTEGRATING INFORMATION OF LEARNERS AND SUBMISSIONS

PEER REVIEWER RECOMMENDATION IN ONLINE SOCIAL LEARNING CONTEXT: INTEGRATING INFORMATION OF LEARNERS AND SUBMISSIONS PEER REVIEWER RECOMMENDATION IN ONLINE SOCIAL LEARNING CONTEXT: INTEGRATING INFORMATION OF LEARNERS AND SUBMISSIONS Yunhong Xu, Faculty of Management and Economcs, Kunmng Unversty of Scence and Technology,

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

universitat Autónoma' de Barcelona

universitat Autónoma' de Barcelona unverstat Autónoma' de Barcelona A new dstrbuted dffuson algorthm for dynamc load-balancng n parallel systems Departament d'informàtca Untat d'arqutectura d'ordnadors Sstemes Operatus A thess submtted

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT Chapter 4 ECOOMIC DISATCH AD UIT COMMITMET ITRODUCTIO A power system has several power plants. Each power plant has several generatng unts. At any pont of tme, the total load n the system s met by the

More information

A system for real-time calculation and monitoring of energy performance and carbon emissions of RET systems and buildings

A system for real-time calculation and monitoring of energy performance and carbon emissions of RET systems and buildings A system for real-tme calculaton and montorng of energy performance and carbon emssons of RET systems and buldngs Dr PAAIOTIS PHILIMIS Dr ALESSADRO GIUSTI Dr STEPHE GARVI CE Technology Center Democratas

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

Lecture 3: Force of Interest, Real Interest Rate, Annuity

Lecture 3: Force of Interest, Real Interest Rate, Annuity Lecture 3: Force of Interest, Real Interest Rate, Annuty Goals: Study contnuous compoundng and force of nterest Dscuss real nterest rate Learn annuty-mmedate, and ts present value Study annuty-due, and

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

How To Get A Tax Refund On A Retirement Account

How To Get A Tax Refund On A Retirement Account CED0105200808 Amerprse Fnancal Servces, Inc. 70400 Amerprse Fnancal Center Mnneapols, MN 55474 Incomng Account Transfer/Exchange/ Drect Rollover (Qualfed Plans Only) for Amerprse certfcates, Columba mutual

More information

In some supply chains, materials are ordered periodically according to local information. This paper investigates

In some supply chains, materials are ordered periodically according to local information. This paper investigates MANUFACTURING & SRVIC OPRATIONS MANAGMNT Vol. 12, No. 3, Summer 2010, pp. 430 448 ssn 1523-4614 essn 1526-5498 10 1203 0430 nforms do 10.1287/msom.1090.0277 2010 INFORMS Improvng Supply Chan Performance:

More information

Time Domain simulation of PD Propagation in XLPE Cables Considering Frequency Dependent Parameters

Time Domain simulation of PD Propagation in XLPE Cables Considering Frequency Dependent Parameters Internatonal Journal of Smart Grd and Clean Energy Tme Doman smulaton of PD Propagaton n XLPE Cables Consderng Frequency Dependent Parameters We Zhang a, Jan He b, Ln Tan b, Xuejun Lv b, Hong-Je L a *

More information

Time Value of Money Module

Time Value of Money Module Tme Value of Money Module O BJECTIVES After readng ths Module, you wll be able to: Understand smple nterest and compound nterest. 2 Compute and use the future value of a sngle sum. 3 Compute and use the

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

An MILP model for planning of batch plants operating in a campaign-mode

An MILP model for planning of batch plants operating in a campaign-mode An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN yfumero@santafe-concet.gov.ar Gabrela Corsano Insttuto de Desarrollo y Dseño

More information

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks LAMOR: Lfetme-Aware Multpath Optmzed Routng Algorthm for Vdeo ransmsson over Ad Hoc Networks 1 Lansheng an, Lng Xe, Kng-m Ko, Mng Le and Moshe Zukerman Abstract Multpath routng s a key technque to support

More information

ADVERTISEMENT FOR THE POST OF DIRECTOR, lim TIRUCHIRAPPALLI

ADVERTISEMENT FOR THE POST OF DIRECTOR, lim TIRUCHIRAPPALLI ADVERTSEMENT FOR THE POST OF DRECTOR, lm TRUCHRAPPALL The ndan nsttute of Management Truchrappall (MT), establshed n 2011 n the regon of Taml Nadu s a leadng management school n nda. ts vson s "Preparng

More information

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW.

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. Lucía Isabel García Cebrán Departamento de Economía y Dreccón de Empresas Unversdad de Zaragoza Gran Vía, 2 50.005 Zaragoza (Span) Phone: 976-76-10-00

More information