Dataflow Features in Computer Networks

Size: px
Start display at page:

Download "Dataflow Features in Computer Networks"

Transcription

1 Magyar Kutatók 1. Nemzetközi Szimpóziuma 1 th International Symposium of Hungarian Researhers on Computational Intelligene and Informatis Gyula Max Budapest University of Tehnology and Eonomis, Department of Automation and Applied Informatis H-1521 Budapest, Po. Box. 91. Hungary max@aut.bme.hu Abstrat. Dataflow in omputer networks an be desribe as a ompliated system. To simulate behaviours of these systems are also diffiult, beause these systems show nonlinear features. Before implementing network equipments users wants to know apability of their omputer network. They do not want the servers to be overloaded during temporary traffi peaks when more requests arrive than the server is designed for. Aording to the non-linear harater of network traffi, a system model is established to exam behaviour of the network planned. This paper presents setting up a non-linear simulation model that helps us to handle dataflow problems of the networks. Keywords: non-linear system analysis, omputer networks, data ongestion, stability 1 Introdution In a large-sale omputer network data pakets may hoose among many routes to arrive their destination address. These seletions are based on knowledge of reent nodes of the omputer networks. In most ases parts of the omputer networks do not know all levels of the fully network. Though almost all nodes take part in the proess of forwarding pakets, nodes of the omputer network know more on neighbours than far ones. In this paper, we firstly summarize the ontributions and limitations inluded in the existing works. In seond session the non-linear model and its behaviours are established foused on ongestion problems and stability. The third session explains the estimation proess of model parameters and riteria, while in the fourth session an ase study is given. These system parameters and riteria are used to analyze quantitatively behaviour and stability of system as well as to investigate the impat of system parameters, suh as data density, load level, link apaity on system stability. The simulation results validate our analysis. Last session shows tendeny of future works. 155

2 Gy. Max 2 Related Works To study network behaviour, traffi parameters are needed to measure and analyse, and to find their statistial laws, suh as was done by Y. Bhole and A. Popesu [1]. After having known the statistial rules, some traffi models are built, suh as the establishment of a model for Novel network traffi by J. Jiang and S. Papavassiliou in [2] or we try to understand why buffers are overflowed like S. Sidiroglou et al. did in [3]. Congestion ontrol methods. We also set up ongestion models. Model of Du Haifeng et al. [4] performs an effetive network ongestion ontrol method for multilayer network. If operational ost is important read I. Chuang s artile [5] on Priing Multiast Communiation. If the time-sale of network traffi is onsidered, the network traffi behaviour will be different in different time-sale. Paxson and Floyd [6] showed that the traffi behaviour of milliseond-time sale is not self-similar by the influene of network protool. Due to the influene of environment, the traffi behaviour whose time-sale is larger than ten minutes is not also self-similar and is a non-linear time-series. Only the traffi behaviour in seond-time sale is self-similar. This problem beomes known when transations of the omputer networks have to be desribed. As it was presented before, the system shows non-linear features, i.e. transations. It means no tools to desribe transations by mathematis of linear ontrol systems. In this paper, a new nonlinear traffi behaviour model is set up and by the aid of this model, the non-linear features of dataflow are desribed. Traffi simulation. The most extensive and modern researhes present diretions of network parameter estimations [7], analyses of traffi generators [8, 9], elasti network nodes [1] et. The non-linear analyses of network nodes [11, 12, 13, 14] is a separate important researh area. Therefore, very important the optimal funtion of the nodes in the system. In terms of the data traffi that would either be the ideal if fewer nodes existed in the network, or in the ase of huge number of nodes these all were linked to all the others. This apparently an absurd approah, already if we look at the eonomi sides of the solution only. A question beomes known, that neessary, that let the nodes be on the entral plae of the examinations. The orret answer is in this diretion, that in terms of the data traffi, the whole network is neessary to put onto the examined entral plae. Stability ontrol. Many papers have theoretially analyzed omputer networks in framework of feedbak ontrol theory based on the ontinuous time model (e.g. [15-19] et.) or disrete-time model (suh as [2] and [21]) after having made some neessary simplifiation and assumption, and finally provided some very revelatory and signifiant onlusions and judgments. In [16], a general nonlinear model was developed, then after linearisation it around equilibrium and making several simplifying assumptions, the suffiient stability ondition was obtained. The main ontribution in [16] was to replae the single-link idential-soure model in [15] with a general model with heterogeneous soures, but omponents 156

3 Magyar Kutatók 1. Nemzetközi Szimpóziuma 1 th International Symposium of Hungarian Researhers on Computational Intelligene and Informatis were approximated linearly. Under this assumption, some possible fators leading to the queue osillation have been suessfully identified, however, the others will be likely hidden. 3 Data Flow Model The omputer network models known by the literature trae bak the data traffi to the desription of a ommuniation happening between edges and nodes of a ommuniation graph. The models handle the nodes as an important element in this desription method. The outome of model is the ommuniation graph that faithfully imitates the physial arrangement of the omputer network, where the nodes, the ative elements of the system are the peaks of the graph, whih are onneted to eah other by the transfer mediums alled edges. This statement is important, beause in the network atually the nodes, the ative elements of the network ommuniate with eah other, and the nodes form the peaks of the network graph in the graph theory model of the omputer network. Figure 1 shows a plain example how nodes ommuniate: Figure 1 Internal and external elements of a network This desription gives bak that view on a natural manner. In this model the entral plae are oupied by nodes as the peaks of the network graph and the edges of the network graph show transations of the traffi in whih the peaks 157

4 Gy. Max ommuniate with eah other along the data lines onneting them. This proess separates our internal nodes, where swithes or bridges are loated with a losed urve from their input and output workstation nodes, as it is shown in figure 1. In the following number of internal, input and output nodes are marked by n, l and m respetively. Consider the network is known in a time t and numbers of bits stored in the nodes are marked with N(t). Now let us examine status of the network in time moment (t+ t). During time t if transfer speeds between nodes (v ij ) are known, the data (N i (t+δt)) stored in node i hange as (1): N i (t+ t) = N i (t) + N inter i + N input i - N output i, (1) where ΔN inter i = n j= 1; i j; C (v ), ij ij ΔN input i = l C ik k = 1; i k; (v ik ), ΔN output i = m i= 1; C (v ). ii ii In (1) C ij (v ij ) = ij *v ij is an elements of the ommuniation matrix depending on v ij and ij desribes features of ommuniation between node i and node j. The ommuniation matrix is desribed detailed in session 5. After summarizing data hanges in all nodes and supposed that node i has only one output, we get total data hange (2) in our network: N 1(t + Δt) N 1(t) N2(t + Δt) N2(t) +. =. Nn(t + Δt) Nn(t) 21 n1 21 n1 12 n2 12 n2 1n 2n 1n 2n (2) + 21 k1 21 k1 12 k2 12 k2 1n 2n 1 n 2n nn nn or (2) in matrix form (3) N(t+ t) = N(t) + C int (v int )*Δt + C inp (v inp )*Δt - C out (v out )*Δt (3) Forming (3) and do t, the result is shown by (4): 158

5 Magyar Kutatók 1. Nemzetközi Szimpóziuma 1 th International Symposium of Hungarian Researhers on Computational Intelligene and Informatis N(t+ t) - N(t) lim = N (t) = C int (v inz ) + C inp (v inp ) - C out (v out ) (4) t t (4) beomes more simply (5) if v int = v inp = v out = v N (t) = v * ( int + inp - out ) (5) Complete alulation of (2) by Taylor series (6) N(t+Δt) = N(t)+N (t)* Δt+N (t)* Δt 2 /2!++ N (n) (t)* Δt n /n! (6) Comparing (2) to (6) we say that N (t)* Δt 2 /2!++N (n) (t)* Δt n /n!= (7) 4 State Variables In the network the transmission speed means how many bits an be transported in one seonds between two nodes. Transmission speed may not be equal in every part of the network, but from node j to node i the same value is supposed and marked with v ij. Eah node has some buffer for their messages. This apaity is measured by data density (8) that shows rate of reent data quantity in time and the maximal data quantity in node i. number of reent data bits in buffer of node i N i (t) x i (t) = = (8) maximal number of data bits in buffer of node i N imax In our model the data density of node i is a number without dimension between <= x <= 1. Traditionally, the numeration of data density shows the differene of outgoing and inoming bits in time t or in other words it shows the maximum number of data bits that an be transferred in the next time unit. Now data density is introdued as a rate of the length of messages stored in node i and the maximal message length. This property shows non-linearity, beause no hane to reeive more bits than the maximal size of the data buffer or node i an not reeive any bit, if node j has no any one to send. In our network data density of node i is marked with x i and data density of input node j that is loated outside of the network is marked with s j. In our model N(t) and x(t) are vetors of n elements. From (8) N i (t) = N imax * x i (t), onsequently N max is a matrix of nxn elements. Elements of N max represent the buffer size of nodes. Sine no buffer between node i and node j, N max is a diagonal matrix. 159

6 Gy. Max 5 Communiation Matrix In (1) (5) the ommuniation matrix plays big role in our model. There are some funtions implemented in C ij (v ij ). Let us examine parts of this matrix. C ij (v ij ) must ontain at least the following: - internal onnetions of the network - environmental onnetions of the network - size of internal buffers in nodes - apabilities of nodes to send and reeive data The apability of node i shows when no data to send, no more room in its buffer as well as the probability of transmission in ase of more output hannels. An element of the Communiation matrix grants the onnetion when node j ommuniates with node i. Creating Communiation matrix is done olumn by olumn. We go through eah element of olumn j, and if a onnetion exists between nodes j and node i, that is node j works to node i, the ommuniation funtion marked C ij - is reated, where (i j, 1 i,j n ). All features are neessary to be taken into onsideration at the time of the forming of the ommuniational matrix by the aid of onnetion funtions C ij. The most important funtion is the model parameter of ij showing properties of the onnetion. Inside traffi regulations are also neessary to be taken into onsideration at the time of the forming of the ommuniational matrix (i.e. data link mehanisms depending on the density of the traffi). In our model, the inner traffi regulations depend on density three funtions of ij (t), S j (t), R i (t) and x i (t), where S j (t) defines properties of sender node, R i (t) delares features of the reeiver, while C ij are defined by produt of these four fators (9): C ij = ij (t) S j (t) R i (t) x i (t) (9) Struture of C ij (t): If there is the opportunity of the permanent ommuniation between two nodes, and the node j works for node i, then ij = e ij p ij, where e ij is the oeffiiene of effetiveness that shows the time rate of real data transfers and total working time, while p ij is the probability of data transmission from node j to node i. If there is not a physial onnetion between these nodes, then ij =. The probability of data transmission, p ij (t) presents the distribution proportion of given routes belonging to a node with relative weighting, where <= p ij (t) <= 1, if node j works for more than one node. The relative weightings of node j are shown in olumn j of the ommuniation matrix and Σp ij (t) = 1 for eah olumn. S j (t) is an automati internal self-regulation funtion (1) of transmitter node with values of 1 or. It shows whether node j has message to send or not. Connetion is disable if data density of node j (x j (t)) equals to, anyway 1. 16

7 Magyar Kutatók 1. Nemzetközi Szimpóziuma 1 th International Symposium of Hungarian Researhers on Computational Intelligene and Informatis 1, x j (t) > S j (t)= (1), x j (t) = R i (t) is another automati internal self-regulation funtion (11) of the reeiver node with values of 1 or. Connetion is enable if data density of node i (x i (t)) smaller, than 1, anyway. Value of 1 means that buffer of node i has been overloaded, so node i loses its ommuniation port to diretion of node j, therefore node i does not reeive any message from node j. 1, x i (t) < 1 R i (t)= (11), x i (t) = 1 Equation (9) transforms (3) into (12) N(t+ t) = N(t) + ij (t) S j (t) R i (t) x i (t) v ij Δt + + i,inpk (t) R i (t) x i (t) v i,inpk Δt - outm,i (t) S i (t) v outm,i Δt (12) In (12) we supposed that input node always an send data to and output nodes an reeive all data from our network. In longer time period x j (t) v ij shows real transmission speed. While S j (t) =1, i.e. v ij Δt <= x j (t) N imax, transmission works. Transmission stops if no more data to transfer. In other words, the average transfer speed for the total time period is x j (t) v ij. 6 Simulation That takes too muh simulation time if dataflow is simulated by bit by bit. We wanted to make a unit for our simulation. So in first step we measured frame lengths. We made data transfers in different time period (early morning, afternoon, midnight), with different data lengths (from some hundred bytes to hundred megabytes) and different transmission speed (from 24 Kbits/s up to 1Mbits/s). Measurements were made by the Wireshark Network Protool Analyzer. After having olleted more hundred thousands messages we analyzed inoming and outgoing frames. The result showed two signifiant figures among the values. One of them was harateristi of onfirmation messages, while the other one was typial data messages. Distribution funtion of data measured is presented in Table 1. It shows the most frequented values. Considering figures table 1 we hose 55 bytes as unit of frame length. Using this frame length an average data length is 26 units. 161

8 Gy. Max Table 1 Number of piees of the most frequented frame length Length Number of Piees Total Length An existing network was simulated that an be seen in Figure xxx. Two files were transmitted through the real network. The first file of 89 MB was transported from Inp1 and the seond one of 91 MB started from Inp2. First hannel used TCP protool, while seond file was transported by FTP protool. In our 1Mb/se hannels the alulated effiieny rate was about 72%, beause the transportations took appr. 2 se. Our model used the same files during the simulation. Figure 2 Struture of the network measured and simulated The seond file was started in 8 seonds after the first one. The third input hannel named Inp3 did not work. The throughput an be seen in Figure 3. Proess time of the simulation is a bit less than the real ommuniation. In the figure 3 we an se that the real ommuniation used different hannel speeds, while the transfer speed was the same in our simulation. During our simulation we supposed that speeds of transmission equal between nodes. This supposition was false as we ould see it in Figure

9 Magyar Kutatók 1. Nemzetközi Szimpóziuma 1 th International Symposium of Hungarian Researhers on Computational Intelligene and Informatis Figure 3 Internal and external elements of a network In the simulation the data density of the internal nodes are also observable. Using different internal buffers in the network observed bottlenek effets an be tested. Figure 4 shows two simulation with different buffer sizes. On the left 5 MByte internal buffer was used, while in seond ase only 1 MByte buffer was alloated. On the left side inputs work linearly, while on the right side shows non-linear faes. Figure 4 Data transfers using different internal buffers in the simulated network Figure 4 helps us to find bottleneks of the network. In the right piture Inp2 was bloked by node Int1, beause there were no enough room for inoming frames. Conlusion and future works This paper looks for possibilities to desribe dataflow model of large-sale omputer networks. A model was presented that was appliable to simulation, planning and regulation of omputer network s traffi. At the time of the model's establishment, the partial differential equations were avoided in the mathematial model beause of the speially hosen state variables. The nodes have honoured 163

10 Gy. Max roles in this non-linear model beause storage apaities of the transmission medium are pratially zero. Nodes either ommuniate to eah other or not. In our model, the mean of the data density is the proportion of the size of data stored in the single node and the data quantity, whih an be stored maximally. Our model examines hange of data density ourred by data flow among the nodes in a region demarated by lose urve. Input and output data densities are regarded as known. At first sight, these proesses are the inputs and outputs of the model. Effetively, these proesses together form the atual inputs of the mathematial model. State variables present data densities arising in the internal nodes of the system. Our system applies a data traffi model involving n internal and m external nodes. To reate the mathematial model the ommuniation matries defining the network has fundamental importane. Our model applies four ommuniation matries. During simulation we supposed that speed of transmission equals between nodes. It must be hanged in the future. We have to work out a quik test to alulate possible ongestion points and gives some riteria to stability of the system. Finally, a simply example was presented to demonstrate usage of the model and how this model is appliable to the simulation, planning or regulation of omputer networks. Referenes [1] Y. Bhole, A. Popesu: Measurement and Analysis of HTTP Traffi. Journal of Network and Systems Management, Vol. 13, No. 4 (25) pp [2] J. Jiang, S. Papavassiliou: Deteting Network Attaks in the Internet via Statistial Network Traffi Normality Predition. Journal of Network and Systems Management, Vol. 12, No. 1, (24) pp [3] S. Sidiroglou, G. Giovanidis, A. D. Keromytis: A Dynami Mehanism for Reovering from Buffer Overflow Attaks, J. Zhou et al. (Eds.): ISC 25, LNCS 365, pp. 1-15, 25 [4] D. Haifeng, X. Yang, L. Lingyun: An Effetive Network Congestion Control Method for Multilayer Network, Journal Of Eletronis (China), Vol.25, No.4, July 28 [5] John C.-I. Change, Marvin A. Sirbu: Priing Multiast Communiation: A Cost-Based Approah, Teleommuniation Systems 17:3, , 21 [6] Paxson, V., Floyd, S.: Wide Area Traffi: The Failure of Poisson Modelling, IEEE/ACM Transations on Networking 3(3), pp (1995) [7] A. M. Galkin, O. A. Simonina, G. G. Yanovsky: Multiservie IP Network QoS Parameters Estimation in Presene of Self-similar Traffi, NEW2AN 26, LNCS 43, pp ,

11 Magyar Kutatók 1. Nemzetközi Szimpóziuma 1 th International Symposium of Hungarian Researhers on Computational Intelligene and Informatis [8] J. Sommers, H. Kim, P. Barford: Harpoon: A Flow Level Traffi Generator for Router and Network Tests, SIGMETRICS/Performane 4, 24, pp [9] S. Avallone, A. Pesape, Giorgio Ventre: Analysis and Experimentation of Internet Traffi Generator, NEW2AN 24, pp. 1-6 [1] M. A. Mansour, L. Srimali: Hölder Continuity of Solutions to Elasti Traffi Network Models, J. Glob. Optim. (28) 4: [11] H. F. Du, Y. Xiao, D. Y. Xu: Nonlinear Stability Analysis for Ative Queue Management, Proeedings of the IEEE International Symposium on Communiations and Information Tehnology (ISCIT 25), 25, Vol. 2, [12] T. Peter, Analysis of Large Sale Transportation Networks, MMA Conferene, Symposium, Budapest (27) [13] Kihl, M., Robertsson, A., Wittenmark, B.: Performane Modelling and Control of Server Systems Using Non-Linear Control Theory, Proeedings of the 18 th International Teletraffi Congress (23) [14] Kihl, M., Robertsson, A., Wittenmark, B.: Control Theoreti Modelling and Design of Admission Control Mehanisms for Server Systems, Proeedings of IFIP Networking (24) [15] Hollot, C., Misra, V., Towsley, D., Gong, W. B.: A Control Theoreti Analysis of RED, Proeedings of IEEE INFOCOM 1, Anhorage, Alaska, 21 [16] Low, S. H., Paganini, F., Wang, J., Adlakha, S., Doyle, J. C.: Dynamis of TCP/RED and a Salable Control, Proeedings of IEEE INFOCOM 2, New York, USA, 22 [17] Hollot, C. V., Chait, Y.: Nonlinear Stability Analysis for a Class of TCP/AQM Networks, IEEE Conferene on Deision and Control, 21, Orlando, pp [18] Aweya, J., Ouellette, M., Montuon, D. Y.: A Linear System Analysis of RED, Computer Communiations 25 (22) [19] Ohsaki, H., Murata, M.: Steady State Analysis of RED Gateway: Stability, Transient Behavior and Parameters Setting, IEICE Transations on Communiations E85-B (1) (22) [2] Firoiu, V., Borden, M.: A Study of Ative Queue Management for Congestion Control, Proeedings of IEEE INFOCOM, Tel Aviv, Israel, Marh 2 [21] Ranjan, P., Abed, E. H., La, R. J.: Nonlinear Instabilities in TCP-RED, Proeedings of IEEE INFOCOM 2, New York, USA,

Computer Networks Framing

Computer Networks Framing Computer Networks Framing Saad Mneimneh Computer Siene Hunter College of CUNY New York Introdution Who framed Roger rabbit? A detetive, a woman, and a rabbit in a network of trouble We will skip the physial

More information

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks Performane Analysis of IEEE 80.11 in Multi-hop Wireless Networks Lan Tien Nguyen 1, Razvan Beuran,1, Yoihi Shinoda 1, 1 Japan Advaned Institute of Siene and Tehnology, 1-1 Asahidai, Nomi, Ishikawa, 93-19

More information

Static Fairness Criteria in Telecommunications

Static Fairness Criteria in Telecommunications Teknillinen Korkeakoulu ERIKOISTYÖ Teknillisen fysiikan koulutusohjelma 92002 Mat-208 Sovelletun matematiikan erikoistyöt Stati Fairness Criteria in Teleommuniations Vesa Timonen, e-mail: vesatimonen@hutfi

More information

A Holistic Method for Selecting Web Services in Design of Composite Applications

A Holistic Method for Selecting Web Services in Design of Composite Applications A Holisti Method for Seleting Web Servies in Design of Composite Appliations Mārtiņš Bonders, Jānis Grabis Institute of Information Tehnology, Riga Tehnial University, 1 Kalu Street, Riga, LV 1658, Latvia,

More information

Channel Assignment Strategies for Cellular Phone Systems

Channel Assignment Strategies for Cellular Phone Systems Channel Assignment Strategies for Cellular Phone Systems Wei Liu Yiping Han Hang Yu Zhejiang University Hangzhou, P. R. China Contat: wliu5@ie.uhk.edu.hk 000 Mathematial Contest in Modeling (MCM) Meritorious

More information

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator nternational Journal of Computer and Eletrial Engineering, Vol. 1, No. 1, April 2009 Neural network-based Load Balaning and Reative Power Control by Stati VAR Compensator smail K. Said and Marouf Pirouti

More information

Sebastián Bravo López

Sebastián Bravo López Transfinite Turing mahines Sebastián Bravo López 1 Introdution With the rise of omputers with high omputational power the idea of developing more powerful models of omputation has appeared. Suppose that

More information

Hierarchical Clustering and Sampling Techniques for Network Monitoring

Hierarchical Clustering and Sampling Techniques for Network Monitoring S. Sindhuja Hierarhial Clustering and Sampling Tehniques for etwork Monitoring S. Sindhuja ME ABSTRACT: etwork monitoring appliations are used to monitor network traffi flows. Clustering tehniques are

More information

Bandwidth Allocation and Session Scheduling using SIP

Bandwidth Allocation and Session Scheduling using SIP JOURAL OF COUICAIS, VOL., O. 5, AUGUS 006 7 Bandwidth Alloation and Session Sheduling using SIP Hassan HASSA, Jean-arie GARCIA and Olivier BRU LAAS-CRS, oulouse, Frane Email: {hhassan}@laas.fr Abstrat

More information

From a strategic view to an engineering view in a digital enterprise

From a strategic view to an engineering view in a digital enterprise Digital Enterprise Design & Management 2013 February 11-12, 2013 Paris From a strategi view to an engineering view in a digital enterprise The ase of a multi-ountry Telo Hervé Paault Orange Abstrat In

More information

A Keyword Filters Method for Spam via Maximum Independent Sets

A Keyword Filters Method for Spam via Maximum Independent Sets Vol. 7, No. 3, May, 213 A Keyword Filters Method for Spam via Maximum Independent Sets HaiLong Wang 1, FanJun Meng 1, HaiPeng Jia 2, JinHong Cheng 3 and Jiong Xie 3 1 Inner Mongolia Normal University 2

More information

A Comparison of Service Quality between Private and Public Hospitals in Thailand

A Comparison of Service Quality between Private and Public Hospitals in Thailand International Journal of Business and Soial Siene Vol. 4 No. 11; September 2013 A Comparison of Servie Quality between Private and Hospitals in Thailand Khanhitpol Yousapronpaiboon, D.B.A. Assistant Professor

More information

Parametric model of IP-networks in the form of colored Petri net

Parametric model of IP-networks in the form of colored Petri net Parametri model of IP-networks in the form of olored Petri net Shmeleva T.R. Abstrat A parametri model of IP-networks in the form of olored Petri net was developed; it onsists of a fixed number of Petri

More information

Chapter 6 A N ovel Solution Of Linear Congruenes Proeedings NCUR IX. (1995), Vol. II, pp. 708{712 Jerey F. Gold Department of Mathematis, Department of Physis University of Utah Salt Lake City, Utah 84112

More information

Suggested Answers, Problem Set 5 Health Economics

Suggested Answers, Problem Set 5 Health Economics Suggested Answers, Problem Set 5 Health Eonomis Bill Evans Spring 2013 1. The graph is at the end of the handout. Fluoridated water strengthens teeth and redues inidene of avities. As a result, at all

More information

Capacity at Unsignalized Two-Stage Priority Intersections

Capacity at Unsignalized Two-Stage Priority Intersections Capaity at Unsignalized Two-Stage Priority Intersetions by Werner Brilon and Ning Wu Abstrat The subjet of this paper is the apaity of minor-street traffi movements aross major divided four-lane roadways

More information

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF ' R :::i:. ATIONAL :'.:::::: RETENTION ':: Compliane with the way you work, PRODUCT BRIEF In-plae Management of Unstrutured Data The explosion of unstrutured data ombined with new laws and regulations

More information

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition

More information

Improved SOM-Based High-Dimensional Data Visualization Algorithm

Improved SOM-Based High-Dimensional Data Visualization Algorithm Computer and Information Siene; Vol. 5, No. 4; 2012 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Siene and Eduation Improved SOM-Based High-Dimensional Data Visualization Algorithm Wang

More information

Price-based versus quantity-based approaches for stimulating the development of renewable electricity: new insights in an old debate

Price-based versus quantity-based approaches for stimulating the development of renewable electricity: new insights in an old debate Prie-based versus -based approahes for stimulating the development of renewable eletriity: new insights in an old debate uthors: Dominique FINON, Philippe MENNTEU, Marie-Laure LMY, Institut d Eonomie et

More information

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA LBNL-52402 Marh 2003 On the Speed of Gravity and the v/ Corretions to the Shapiro Time Delay Stuart Samuel 1 arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrene Berkeley National Laboratory

More information

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1 OpenSape 4000 CSTA V7 Connetivity Adapter - CSTA III, Part 2, Version 4.1 Developer s Guide A31003-G9310-I200-1-76 Our Quality and Environmental Management Systems are implemented aording to the requirements

More information

Deadline-based Escalation in Process-Aware Information Systems

Deadline-based Escalation in Process-Aware Information Systems Deadline-based Esalation in Proess-Aware Information Systems Wil M.P. van der Aalst 1,2, Mihael Rosemann 2, Marlon Dumas 2 1 Department of Tehnology Management Eindhoven University of Tehnology, The Netherlands

More information

Customer Efficiency, Channel Usage and Firm Performance in Retail Banking

Customer Efficiency, Channel Usage and Firm Performance in Retail Banking Customer Effiieny, Channel Usage and Firm Performane in Retail Banking Mei Xue Operations and Strategi Management Department The Wallae E. Carroll Shool of Management Boston College 350 Fulton Hall, 140

More information

Open and Extensible Business Process Simulator

Open and Extensible Business Process Simulator UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Siene Karl Blum Open and Extensible Business Proess Simulator Master Thesis (30 EAP) Supervisors: Luiano Garía-Bañuelos,

More information

An Enhanced Critical Path Method for Multiple Resource Constraints

An Enhanced Critical Path Method for Multiple Resource Constraints An Enhaned Critial Path Method for Multiple Resoure Constraints Chang-Pin Lin, Hung-Lin Tai, and Shih-Yan Hu Abstrat Traditional Critial Path Method onsiders only logial dependenies between related ativities

More information

MATE: MPLS Adaptive Traffic Engineering

MATE: MPLS Adaptive Traffic Engineering MATE: MPLS Adaptive Traffi Engineering Anwar Elwalid Cheng Jin Steven Low Indra Widjaja Bell Labs EECS Dept EE Dept Fujitsu Network Communiations Luent Tehnologies Univ. of Mihigan Calteh Pearl River,

More information

Classical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk

Classical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk Classial Eletromagneti Doppler Effet Redefined Copyright 04 Joseph A. Rybzyk Abstrat The lassial Doppler Effet formula for eletromagneti waves is redefined to agree with the fundamental sientifi priniples

More information

Programming Basics - FORTRAN 77 http://www.physics.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html

Programming Basics - FORTRAN 77 http://www.physics.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html CWCS Workshop May 2005 Programming Basis - FORTRAN 77 http://www.physis.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html Program Organization A FORTRAN program is just a sequene of lines of plain text.

More information

CARRIER VOICE NETWORK MANAGEMENT

CARRIER VOICE NETWORK MANAGEMENT CARRIER VOICE NETWORK MANAGEMENT Elvis N. Ngah Supervised by: Dr. Sandjai Bhulai Department of Mathematis Vrije Universiteit Amsterdam The Netherlands Deryk Cole Network Operations Center Telesonique Global

More information

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services T Learning Curves and Stohasti Models for Priing and Provisioning Cloud Computing Servies Amit Gera, Cathy H. Xia Dept. of Integrated Systems Engineering Ohio State University, Columbus, OH 4310 {gera.,

More information

Chapter 5 Single Phase Systems

Chapter 5 Single Phase Systems Chapter 5 Single Phase Systems Chemial engineering alulations rely heavily on the availability of physial properties of materials. There are three ommon methods used to find these properties. These inlude

More information

Supply chain coordination; A Game Theory approach

Supply chain coordination; A Game Theory approach aepted for publiation in the journal "Engineering Appliations of Artifiial Intelligene" 2008 upply hain oordination; A Game Theory approah Jean-Claude Hennet x and Yasemin Arda xx x LI CNR-UMR 668 Université

More information

i_~f e 1 then e 2 else e 3

i_~f e 1 then e 2 else e 3 A PROCEDURE MECHANISM FOR BACKTRACK PROGRAMMING* David R. HANSON + Department o Computer Siene, The University of Arizona Tuson, Arizona 85721 One of the diffiulties in using nondeterministi algorithms

More information

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES Proeedings of FEDSM 98 998 ASME Fluids Engineering Division Summer Meeting June 2-25, 998 Washington DC FEDSM98-529 THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES John D. Wright Proess

More information

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty ISSN 1816-6075 (Print), 1818-0523 (Online) Journal of System and Management Sienes Vol. 2 (2012) No. 3, pp. 9-17 An integrated optimization model of a Closed- Loop Supply Chain under unertainty Xiaoxia

More information

Big Data Analysis and Reporting with Decision Tree Induction

Big Data Analysis and Reporting with Decision Tree Induction Big Data Analysis and Reporting with Deision Tree Indution PETRA PERNER Institute of Computer Vision and Applied Computer Sienes, IBaI Postbox 30 11 14, 04251 Leipzig GERMANY pperner@ibai-institut.de,

More information

Scalable TCP: Improving Performance in Highspeed Wide Area Networks

Scalable TCP: Improving Performance in Highspeed Wide Area Networks Salable TP: Improving Performane in Highspeed Wide Area Networks Tom Kelly ERN - IT Division Geneva 3 Switzerland tk@am.a.uk ABSTRAT TP ongestion ontrol an perform badly in highspeed wide area networks

More information

Granular Problem Solving and Software Engineering

Granular Problem Solving and Software Engineering Granular Problem Solving and Software Engineering Haibin Zhu, Senior Member, IEEE Department of Computer Siene and Mathematis, Nipissing University, 100 College Drive, North Bay, Ontario, P1B 8L7, Canada

More information

Using Live Chat in your Call Centre

Using Live Chat in your Call Centre Using Live Chat in your Call Centre Otober Key Highlights Yesterday's all entres have beome today's ontat entres where agents deal with multiple queries from multiple hannels. Live Chat hat is one now

More information

In order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method

In order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method BEAM DESIGN In order to be able to design beams, we need both moments and shears. 1. Moment a) From diret design method or equivalent frame method b) From loads applied diretly to beams inluding beam weight

More information

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management (full-time) For students entering in 2015/6 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date

More information

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs)

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs) 23 IEEE International Conferene on High Performane Computing and Communiations & 23 IEEE International Conferene on Embedded and Ubiquitous Computing Dedupliation with Blok-Level Content-Aware Chunking

More information

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu

More information

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero FE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero Robotis, Computer Vision and Intelligent Control Group. University

More information

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism An Effiient Network Traffi Classifiation Based on Unknown and Anomaly Flow Detetion Mehanism G.Suganya.M.s.,B.Ed 1 1 Mphil.Sholar, Department of Computer Siene, KG College of Arts and Siene,Coimbatore.

More information

WORKFLOW CONTROL-FLOW PATTERNS A Revised View

WORKFLOW CONTROL-FLOW PATTERNS A Revised View WORKFLOW CONTROL-FLOW PATTERNS A Revised View Nik Russell 1, Arthur H.M. ter Hofstede 1, 1 BPM Group, Queensland University of Tehnology GPO Box 2434, Brisbane QLD 4001, Australia {n.russell,a.terhofstede}@qut.edu.au

More information

Chapter 1 Microeconomics of Consumer Theory

Chapter 1 Microeconomics of Consumer Theory Chapter 1 Miroeonomis of Consumer Theory The two broad ategories of deision-makers in an eonomy are onsumers and firms. Eah individual in eah of these groups makes its deisions in order to ahieve some

More information

Algorithm of Removing Thin Cloud-fog Cover from Single Remote Sensing Image

Algorithm of Removing Thin Cloud-fog Cover from Single Remote Sensing Image Journal of Information & Computational Siene 11:3 (2014 817 824 February 10, 2014 Available at http://www.jois.om Algorithm of Removing Thin Cloud-fog Cover from Single Remote Sensing Image Yinqi Xiong,

More information

On the Characteristics of Spectrum-Agile Communication Networks

On the Characteristics of Spectrum-Agile Communication Networks 1 On the Charateristis of Spetrum-Agile Communiation Networks Xin Liu Wei Wang Department of Computer Siene University of California, Davis, CA 95616 Email:{liu,wangw}@s.udavis.edu Abstrat Preliminary

More information

Computational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings

Computational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings Computational Analysis of Two Arrangements of a Central Ground-Soure Heat Pump System for Residential Buildings Abstrat Ehab Foda, Ala Hasan, Kai Sirén Helsinki University of Tehnology, HVAC Tehnology,

More information

Weighting Methods in Survey Sampling

Weighting Methods in Survey Sampling Setion on Survey Researh Methods JSM 01 Weighting Methods in Survey Sampling Chiao-hih Chang Ferry Butar Butar Abstrat It is said that a well-designed survey an best prevent nonresponse. However, no matter

More information

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS Virginia Department of Taxation INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS www.tax.virginia.gov 2614086 Rev. 01/16 Table of Contents Introdution... 1 Important... 1 Where to Get Assistane... 1 Online File

More information

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS Virginia Department of Taxation INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS www.tax.virginia.gov 2614086 Rev. 07/14 * Table of Contents Introdution... 1 Important... 1 Where to Get Assistane... 1 Online

More information

RESEARCH SEMINAR IN INTERNATIONAL ECONOMICS. Discussion Paper No. 475. The Evolution and Utilization of the GATT/WTO Dispute Settlement Mechanism

RESEARCH SEMINAR IN INTERNATIONAL ECONOMICS. Discussion Paper No. 475. The Evolution and Utilization of the GATT/WTO Dispute Settlement Mechanism RESEARCH SEMINAR IN INTERNATIONAL ECONOMICS Shool of Publi Poliy The University of Mihigan Ann Arbor, Mihigan 48109-1220 Disussion Paper No. 475 The Evolution and Utilization of the GATT/WTO Dispute Settlement

More information

Electrician'sMathand BasicElectricalFormulas

Electrician'sMathand BasicElectricalFormulas Eletriian'sMathand BasiEletrialFormulas MikeHoltEnterprises,In. 1.888.NEC.CODE www.mikeholt.om Introdution Introdution This PDF is a free resoure from Mike Holt Enterprises, In. It s Unit 1 from the Eletrial

More information

Recovering Articulated Motion with a Hierarchical Factorization Method

Recovering Articulated Motion with a Hierarchical Factorization Method Reovering Artiulated Motion with a Hierarhial Fatorization Method Hanning Zhou and Thomas S Huang University of Illinois at Urbana-Champaign, 405 North Mathews Avenue, Urbana, IL 680, USA {hzhou, huang}@ifpuiuedu

More information

10.1 The Lorentz force law

10.1 The Lorentz force law Sott Hughes 10 Marh 2005 Massahusetts Institute of Tehnology Department of Physis 8.022 Spring 2004 Leture 10: Magneti fore; Magneti fields; Ampere s law 10.1 The Lorentz fore law Until now, we have been

More information

Effects of Inter-Coaching Spacing on Aerodynamic Noise Generation Inside High-speed Trains

Effects of Inter-Coaching Spacing on Aerodynamic Noise Generation Inside High-speed Trains Effets of Inter-Coahing Spaing on Aerodynami Noise Generation Inside High-speed Trains 1 J. Ryu, 1 J. Park*, 2 C. Choi, 1 S. Song Hanyang University, Seoul, South Korea 1 ; Korea Railroad Researh Institute,

More information

INTELLIGENCE IN SWITCHED AND PACKET NETWORKS

INTELLIGENCE IN SWITCHED AND PACKET NETWORKS 22-24 Setember, Sozool, ULGRI INTELLIGENCE IN SWITCHED ND PCKET NETWORKS Ivaylo Ivanov tanasov Deartment of teleommuniations, Tehnial University of Sofia, 7 Kliment Ohridski st., 1000, hone: +359 2 965

More information

Green Cloud Computing

Green Cloud Computing International Journal of Information and Computation Tehnology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 431-436 International Researh Publiations House http://www. irphouse.om /ijit.htm Green Cloud

More information

Intuitive Guide to Principles of Communications By Charan Langton www.complextoreal.com

Intuitive Guide to Principles of Communications By Charan Langton www.complextoreal.com Intuitive Guide to Priniples of Communiations By Charan Langton www.omplextoreal.om Understanding Frequeny Modulation (FM), Frequeny Shift Keying (FSK), Sunde s FSK and MSK and some more The proess of

More information

Findings and Recommendations

Findings and Recommendations Contrating Methods and Administration Findings and Reommendations Finding 9-1 ESD did not utilize a formal written pre-qualifiations proess for seleting experiened design onsultants. ESD hose onsultants

More information

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management For students entering in 2012/3 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date of speifiation:

More information

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods Doug A. Bowman bowman@vt.edu Department of Computer Siene Virginia Teh Joseph L. Gabbard Deborah Hix [ jgabbard, hix]@vt.edu Systems Researh Center Virginia Teh A Survey of Usability Evaluation in Virtual

More information

cos t sin t sin t cos t

cos t sin t sin t cos t Exerise 7 Suppose that t 0 0andthat os t sin t At sin t os t Compute Bt t As ds,andshowthata and B ommute 0 Exerise 8 Suppose A is the oeffiient matrix of the ompanion equation Y AY assoiated with the

More information

Agent-Based Grid Load Balancing Using Performance-Driven Task Scheduling

Agent-Based Grid Load Balancing Using Performance-Driven Task Scheduling Agent-Based Grid Load Balaning Using Performane-Driven Task Sheduling Junwei Cao *1, Daniel P. Spooner, Stephen A. Jarvis, Subhash Saini and Graham R. Nudd * C&C Researh Laboratories, NEC Europe Ltd.,

More information

Software Ecosystems: From Software Product Management to Software Platform Management

Software Ecosystems: From Software Product Management to Software Platform Management Software Eosystems: From Software Produt Management to Software Platform Management Slinger Jansen, Stef Peeters, and Sjaak Brinkkemper Department of Information and Computing Sienes Utreht University,

More information

protection p1ann1ng report

protection p1ann1ng report f1re~~ protetion p1ann1ng report BUILDING CONSTRUCTION INFORMATION FROM THE CONCRETE AND MASONRY INDUSTRIES Signifiane of Fire Ratings for Building Constrution NO. 3 OF A SERIES The use of fire-resistive

More information

AT 6 OF 2012 GAMBLING DUTY ACT 2012

AT 6 OF 2012 GAMBLING DUTY ACT 2012 i e AT 6 OF 2012 GAMBLING DUTY ACT 2012 Gambling Duty At 2012 Index i e GAMBLING DUTY ACT 2012 Index Setion Page PART 1 INTRODUCTORY 5 1 Short title... 5 2 Commenement... 5 3 General interpretation...

More information

Lemon Signaling in Cross-Listings Michal Barzuza*

Lemon Signaling in Cross-Listings Michal Barzuza* Lemon Signaling in Cross-Listings Mihal Barzuza* This paper analyzes the deision to ross-list by managers and ontrolling shareholders assuming that they have private information with respet to the amount

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1: Introdution 1.1 Pratial olumn base details in steel strutures 1.1.1 Pratial olumn base details Every struture must transfer vertial and lateral loads to the supports. In some ases, beams or

More information

Availability, Reliability, Maintainability, and Capability

Availability, Reliability, Maintainability, and Capability Availability, Reliability, Maintainability, and Capability H. Paul Barringer, P.E. Barringer & Assoiates, In. Humble, TX Triplex Chapter Of The Vibrations Institute Hilton Hotel Beaumont, Texas February

More information

luxcontrol DALI manual

luxcontrol DALI manual luxcontrol DALI manual . Tridoni GmbH & Co KG Färbergasse 15 6851 Dornbirn Austria Version 3.0 www.tridoni.om Subjet to hange without prior notie. All information is subjet to hange 2 / 93 Table of ontents

More information

AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Construction

AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Construction AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Constrution Raymond Sweha Boston University remos@s.bu.edu Vathe Ishakian Boston University visahak@s.bu.edu Azer Bestavros

More information

Wireless Networking Guide 2007 www.lexmark.com

Wireless Networking Guide 2007 www.lexmark.com Wireless Networking Guide 2007 www.lexmark.om P/N 13L0828 E.C. 3L0101 Contents Installing the printer on a wireless network...4 Wireless network ompatiility...4 Information you will need to set up the

More information

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection Behavior Analysis-Based Learning Framework for Host Level Intrusion Detetion Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit Eletrial and Computer Engineering Department University of Arizona

More information

Table of Contents. Appendix II Application Checklist. Export Finance Program Working Capital Financing...7

Table of Contents. Appendix II Application Checklist. Export Finance Program Working Capital Financing...7 Export Finane Program Guidelines Table of Contents Setion I General...........................................................1 A. Introdution............................................................1

More information

User s Guide VISFIT: a computer tool for the measurement of intrinsic viscosities

User s Guide VISFIT: a computer tool for the measurement of intrinsic viscosities File:UserVisfit_2.do User s Guide VISFIT: a omputer tool for the measurement of intrinsi visosities Version 2.a, September 2003 From: Multiple Linear Least-Squares Fits with a Common Interept: Determination

More information

Pattern Recognition Techniques in Microarray Data Analysis

Pattern Recognition Techniques in Microarray Data Analysis Pattern Reognition Tehniques in Miroarray Data Analysis Miao Li, Biao Wang, Zohreh Momeni, and Faramarz Valafar Department of Computer Siene San Diego State University San Diego, California, USA faramarz@sienes.sdsu.edu

More information

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts FOOD FOR THOUGHT Topial Insights from our Sujet Matter Experts DEGREE OF DIFFERENCE TESTING: AN ALTERNATIVE TO TRADITIONAL APPROACHES The NFL White Paper Series Volume 14, June 2014 Overview Differene

More information

Implementation of PIC Based LED Displays

Implementation of PIC Based LED Displays International Journal of Eletronis and Computer Siene Engineering Available Online at www.ijese.org ISSN- - Implementation of PIC Based LED Displays Htet Htet Thit San, Chaw Myat Nwe and Hla Myo Tun Department

More information

Interaction-Driven Virtual Reality Application Design

Interaction-Driven Virtual Reality Application Design Nar s Parés npares@iua.upf.es Ro Parés rpares@iua.upf.es Audiovisual Institute, Universitat Pompeu Fabra, Pg. Cirumval. laió, 8 08003 Barelona, Spain www.iua.upf.es/, gvirtual Interation-Driven Virtual

More information

OpenSession: SDN-based Cross-layer Multi-stream Management Protocol for 3D Teleimmersion

OpenSession: SDN-based Cross-layer Multi-stream Management Protocol for 3D Teleimmersion : SN-based ross-layer Multi-stream Management Protool for 3 Teleimmersion hsan refin Raoul Rivas Rehana Tabassum Klara Nahrstedt University of Illinois at Urbana-hampaign, Urbana, IL {marefin2, trivas,

More information

) ( )( ) ( ) ( )( ) ( ) ( ) (1)

) ( )( ) ( ) ( )( ) ( ) ( ) (1) OPEN CHANNEL FLOW Open hannel flow is haraterized by a surfae in ontat with a gas phase, allowing the fluid to take on shapes and undergo behavior that is impossible in a pipe or other filled onduit. Examples

More information

Effectiveness of a law to reduce alcohol-impaired driving in Japan

Effectiveness of a law to reduce alcohol-impaired driving in Japan Effetiveness of a law to redue alohol-impaired driving in Japan T Nagata, 1,2 S Setoguhi, 3 D Hemenway, 4 M J Perry 5 Original artile 1 Takemi Program, Department of International Health, Harvard Shool

More information

NOMCLUST: AN R PACKAGE FOR HIERARCHICAL CLUSTERING OF OBJECTS CHARACTERIZED BY NOMINAL VARIABLES

NOMCLUST: AN R PACKAGE FOR HIERARCHICAL CLUSTERING OF OBJECTS CHARACTERIZED BY NOMINAL VARIABLES The 9 th International Days of Statistis and Eonomis, Prague, September 10-1, 015 NOMCLUST: AN R PACKAGE FOR HIERARCHICAL CLUSTERING OF OBJECTS CHARACTERIZED BY NOMINAL VARIABLES Zdeněk Šul Hana Řezanková

More information

Robust Classification and Tracking of Vehicles in Traffic Video Streams

Robust Classification and Tracking of Vehicles in Traffic Video Streams Proeedings of the IEEE ITSC 2006 2006 IEEE Intelligent Transportation Systems Conferene Toronto, Canada, September 17-20, 2006 TC1.4 Robust Classifiation and Traking of Vehiles in Traffi Video Streams

More information

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401 IEEE TRASACTIOS O DEPEDABLE AD SECURE COMPUTIG, VOL. 9, O. 3, MAY/JUE 2012 401 Mitigating Distributed Denial of Servie Attaks in Multiparty Appliations in the Presene of Clok Drifts Zhang Fu, Marina Papatriantafilou,

More information

university of illinois library AT URBANA-CHAMPAIGN BOOKSTACKS

university of illinois library AT URBANA-CHAMPAIGN BOOKSTACKS university of illinois library AT URBANA-CHAMPAIGN BOOKSTACKS CENTRAL CIRCULATION BOOKSTACKS The person harging this material is responsible for its renewal or its return to the library from whih it was

More information

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model Trade Information, Not Spetrum: A Novel TV White Spae Information Market Model Yuan Luo, Lin Gao, and Jianwei Huang 1 Abstrat In this paper, we propose a novel information market for TV white spae networks,

More information

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds Intelligent Measurement Proesses in 3D Optial Metrology: Produing More Aurate Point Clouds Charles Mony, Ph.D. 1 President Creaform in. mony@reaform3d.om Daniel Brown, Eng. 1 Produt Manager Creaform in.

More information

Unit 12: Installing, Configuring and Administering Microsoft Server

Unit 12: Installing, Configuring and Administering Microsoft Server Unit 12: Installing, Configuring and Administering Mirosoft Server Learning Outomes A andidate following a programme of learning leading to this unit will be able to: Selet a suitable NOS to install for

More information

A novel active mass damper for vibration control of bridges

A novel active mass damper for vibration control of bridges IABMAS 08, International Conferene on Bridge Maintenane, Safety and Management, 3-7 July 008, Seoul, Korea A novel ative mass damper for vibration ontrol of bridges U. Starossek & J. Sheller Strutural

More information

Discovering Trends in Large Datasets Using Neural Networks

Discovering Trends in Large Datasets Using Neural Networks Disovering Trends in Large Datasets Using Neural Networks Khosrow Kaikhah, Ph.D. and Sandesh Doddameti Department of Computer Siene Texas State University San Maros, Texas 78666 Abstrat. A novel knowledge

More information

VOLUME 13, ARTICLE 5, PAGES 117-142 PUBLISHED 05 OCTOBER 2005 DOI: 10.4054/DemRes.2005.13.

VOLUME 13, ARTICLE 5, PAGES 117-142 PUBLISHED 05 OCTOBER 2005  DOI: 10.4054/DemRes.2005.13. Demographi Researh a free, expedited, online journal of peer-reviewed researh and ommentary in the population sienes published by the Max Plank Institute for Demographi Researh Konrad-Zuse Str. 1, D-157

More information

Board Building Recruiting and Developing Effective Board Members for Not-for-Profit Organizations

Board Building Recruiting and Developing Effective Board Members for Not-for-Profit Organizations Board Development Board Building Reruiting and Developing Effetive Board Members for Not-for-Profit Organizations Board Development Board Building Reruiting and Developing Effetive Board Members for Not-for-Profit

More information

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts State of Maryland Partiipation Agreement for Pre-Tax and Roth Retirement Savings Aounts DC-4531 (08/2015) For help, please all 1-800-966-6355 www.marylandd.om 1 Things to Remember Complete all of the setions

More information

CIS570 Lecture 4 Introduction to Data-flow Analysis 3

CIS570 Lecture 4 Introduction to Data-flow Analysis 3 Introdution to Data-flow Analysis Last Time Control flow analysis BT disussion Today Introdue iterative data-flow analysis Liveness analysis Introdue other useful onepts CIS570 Leture 4 Introdution to

More information

International Journal of Supply and Operations Management. Mathematical modeling for EOQ inventory system with advance payment and fuzzy Parameters

International Journal of Supply and Operations Management. Mathematical modeling for EOQ inventory system with advance payment and fuzzy Parameters nternational Journal of Supply and Operations Management JSOM November 0, Volume, ssue 3, pp. 60-78 SSN-Print: 383-359 SSN-Online: 383-55 www.ijsom.om Mathematial modeling for EOQ inventory system with

More information