Splicing System Based Genetic Algorithms for Developing RBF Networks

Size: px
Start display at page:

Download "Splicing System Based Genetic Algorithms for Developing RBF Networks"

Transcription

1 Chin. J. Chem. Eng., 5() (007) Spicing System Based Genetic Agorithms for Deveoping RBF Networks Modes * TAO Jii( 陶吉利 ) and WANG Ning( 王宁 )** Nationa Laboratory of Industria Contro Technoogy, Institute of Advanced Process Contro, Zhejiang University, Hangzhou 3007, China Abstract A spicing system based genetic agorithm is proposed to optimize dynamica radia basis function (RBF) neura network, which is used to extract vauabe process information from input output data. The nove RBF network training technique incudes the network structure into the set of function centers by compromising between the conficting requirements of reducing prediction error and simutaneousy decreasing mode compexity. The effectiveness of the proposed method is iustrated through the deveopment of dynamic modes as a benchmark discrete exampe and a continuous stirred tank reactor by comparing with severa different RBF network training methods. Keywords RBF network, structure optimization, genetic agorithm, spicing system INTRODUCTION Radia basis function (RBF) networks attracted considerabe interest in the past because of its severa advantages compared with other types of artificia neura networks (ANNs), such as better approximation capabiities, simper network structures, and faster earning agorithms[]. However, the seection of appropriate number of basis functions is a critica issue for RBF networks[]. The number of basis functions contros the compexity of the structure, i.e., the generaization capabiity of RBF networks. A RBF network, containing very few basis functions, yieds poor predictions on new data, i.e., poor generaization, as the mode has imited fexibiity. The RBF network, containing severa basis functions, aso yieds poor generaization, as it is too fexibe and fits the noise in the training data. The best generaization performance is obtained via the compromise between the conficting requirements of simutaneousy reducing the prediction error and decreasing the compexity of the mode. This trade-off highights the importance of optimizing the compexity of RBF network to achieve the best generaization. More specificay, most of the standard RBF training methods require the designer to fix the network structure. These training procedures usuay proceed via two steps[3]: First, the centers of basis function are determined using custering method. Second, the cacuation of the fina-ayer weights is reduced to sove a simpe inear system using east squares method. Therefore, the first stage is an unsupervised method, and separated from the actua objective to minimize the output prediction error. In this study, the RBF networks are constructed using the input data supervised by the output data. The incusion of the structure seection in the formuation of the network optimization probem is desirabe, but it resuts in a rather difficut probem, which cannot be easiy soved using the standard optimization methods. An interesting aternative for soving this compicated probem is offered by the use of the recenty deveoped evoutionary computation methods. Perhaps the most popuar and successfu strategies are the so-caed genetic agorithms (GAs), which are stochastic methods based on the principes of natura seection and evoution[4]. GAs have proved to be successfu in the structure seection of severa types of neura networks, such as BP neura networks[5,6] and recurrent neura networks[7,8]. As to the optimization of RBF networks, Vesin and Gruter used GA to sove the compete optimization probem, but the centers of the potentia nodes were restricted among the set of training data[9]. Esposito et a. empoyed a GA based technique to determine the widths of Gaussian functions in RBF networks[0], whereas Sarimveis et a. used GA approach to optimize the parameters of RBF networks in terms of the error minimization criterion[]. In this study, the structure seection is incuded, and the fitness of each chromosome is cacuated on the basis of the prediction error and the structure compexity criterion. To simpify the optimization of RBF network, the radia basis function is chosen as thin-pate-spine function[], where the determination of widths is not required. Therefore, the GA in this study is used to determine the centers of basis functions and the network structure. The fina-ayer weights are derived using recursive east squares (RLS) method with the same initia weight vector. The proposed agorithm starts with a random popuation of RBF networks, which are coded as chromosomes. As a the function centers generated by stochastic chromosomes are not feasibe, two nove operators, i.e., eongation and deetion, enightened by DNA spicing system[3,4], are introduced in the GA approach. SPLICING SYSTEM BASED GA FOR RBF NETWORKS Generay, the determination of the RBF centers Received , accepted * Supported by the Nationa Natura Science Foundation of China (No.60400), and the Nationa High Technoogy Research and Deveopment Program of China (863 Program, 006AA040308). ** To whom correspondence shoud be addressed. E-mai: nwang@iipc.zju.edu.cn

2 Spicing System Based Genetic Agorithms for Deveoping RBF Networks Modes 4 is based on a sef-organizing custering approach, such as k-means custering[5], the nearest neighbor custering method[6]. The appication of the above agorithms requires the transcendenta knowedge of an appropriate custering degree which is difficut to determine, and it considers ony the input data. The proposed approach in this study does not require the transcendenta knowedge of the pant; moreover, the structure and RBF centers can be synchronousy optimized by utiizing the input output data. GA is an optimization agorithm on the basis of Darwinism, which is very fexibe. Depending on the features of the probem's soution space, there is a wide range of choices of fitness functions, the coding method, and the genetic operations, and a these factors affect the efficiency of genetic agorithm. This study is focused on the optimization of RBF network using the spicing system based GA.. Coding method There are totay n r n rea number parameters to be optimized in the RBF network, which means one chromosome shoud be abe to give n r n rea number vaues, where n r is the number of hidden nodes, n is the number of input nodes. Hence, binary coding chromosome wi become very compex, and decima coding chromosome is used. The structure of the th chromosome is shown beow c, c, c, n c, c, c, n C = c n r, c n r, c () n r, n where =,,, L, L is the size of the popuation, n r is randomy produced between and D, D is the maximum number of hidden nodes, the rows beow n r are set to zeros and do not correspond to the center. The eements of C are computed using the foowing equation: c = x + r ( x x ) j j,min j,max j,min nr, j n () where r is the random number between 0 and, x j,min and x j,max is the minimum and the maximum vaues of input variabes given in the probem.. Fitness function As mentioned in the above sections, the drawbacks of the genera training methods of RBF network mainy ie in the absence of goba optimization of both the approximation capabiity and the generaization performance. To overcome these drawbacks, the choice of appropriate fitness function is crucia. In this study, the training procedures using spicing system based GA are aso preceded in two steps: First, the network structure and the basis function parameters are determined using the chromosomes of one popuation. Second, the fina-ayer weights are cacuated using east squares method. As the direct east squares method cannot obtain the soutions for a bad-conditioned matrix, the output weights of the th RBF neura network are cacuated using the foowing RLS method[7]: T w( k) = w( k ) + K( k)[ y( k) Xr ( k) w( k )] T K( k) = P( k ) Xr( k)[ Xr ( k) P( k ) Xr( k) + ] T T P( k) = P( k ) K( k) K ( k)[ Xr ( k) P( k ) Xr( k) + ] (3) where k N, N is the maximum iterative time, X r (k) is the n r dimension output vector of the hidden ayer, y(k) is the output of the actua system, K(k) is the n r dimension assistant vector, P(k) is the n r -by- n r assistant matrix. From Eq.(3), the computationa compexity of RLS soution for one iterative time is ob- ( ) tained as ( ) O n r. Hence, the compexity of RLS soution for the th network weight vector is ( ( ) ) O N n. r In every generation of GA, the cacuation of the output weights competes the formuation of L RBF networks, which can be represented by the pairs (C, w ), (C, w ), and (C L, w L ). To obtain good generaization capabiity of RBF networks, the training data are divided into two groups, one group of data (X, Y ) are used to cacuate the fina-ayer weights, herein, N=N (N is the number of the first group data), and the other group of data (X, Y ) are utiized to evauate the produced RBF networks in each generation. This scheme incorporates a testing procedure into the training agorithm, and guarantees good generaization performance of the RBF networks. However, to obtain good approximation capabiity of RBF networks, the network structure sti becomes much compex. The structure compexity of RBF network conficts with the generaization performance of neura networks. Therefore, the objective function considering both approximation capabiity and generaization performance is shown as foows. N ˆ J( C, w ) = Nn Y( t) Y( t) + ηnr n( N) (4) t = Equation (4) expresses a compromise between the cost of modeing errors and the compexity of network structure[3], where Y ˆ () t is the output of RBF network, N is the number of the second group data, n r is the number of hidden nodes in the th chromosome, η is the weight coefficient, and 0 η, the greater the η is, the stronger constraint of structure compexity woud be considered. In this study, η is set as. Chin. J. Ch. E. 5() 40 (007)

3 4 Chin. J. Ch. E. (Vo. 5, No.).3 Operators in spicing system based GA Li et a.[3] summarized a possibe operations of the DNA spicing systems, such as eongation operation, deetion operation, absent operation, insertion operation, transocation operation, transformation operation permutation operation, etc. Above operations actuay incude three basic operations: seection, crossover, and mutation. Other operations adopted by standard genetic agorithm (SGA) for specia probems may improve the performance of SGA..3. Seection operator A set of individuas from the previous popuation must be seected for reproduction. This seection depends on their fitness vaues. Individuas with good fitness vaues wi most probaby survive. There exist different types of seection operators, and in this study rouette whee method is appied. The probabiity of the seected individua, P(C ), is given by: L P( C ) = f( C ) f( C ) (5) = where f(c ) is the fitness function of the individua C, which is obtained by /J(C, w ). The rouette whee is paced with L equay spaced pointers. A singe spin of the rouette whee wi simutaneousy pick a the members of the next popuation.as the computationa compexity in Eq.(4) is O(N ), the compexity of seection operator in one generation is O(LN )..3. Crossover operator The crossover operator is appied after seection with a probabiity (p c ), which produces nove individuas, i.e., the nove structure and centers of RBF networks. It is executed between the currenty seected individua C and its subsequent individua C +, and yieds the offspring chromosomes C, C. As the number of input nodes (n) is fixed during the whoe GA optimization process, the crossover point is chosen between and n. The procedure is demonstrated in Fig., which represents the singe-point crossover. As the computationa compexity of the pus operator for two D-by-n matrices is O(nD), in the worst case (a chromosome pairs execute crossover operator), the crossover operator in one generation requires O(LnD/) computations..3.3 Mutation operator To effectivey expore the search space, mutation is carried out. When the eement of an individua is ' ' + mutated with a probabiity (p m ), it is repaced by a nove generated eement in terms of Eq.(). Simiar compexity can be obtained as in the case of crossover operator, which is O(LnD)..3.4 Spicing operators As shown in the description of the crossover operation, different structures of RBF networks can be produced using this genetic operator. However, the operator may yied unreasonabe RBF structure as shown in Fig., where most of the centers in row 5 and row 6 of C ' are zeros. Moreover, the crossover operator does not aways modify the structure of the parent chromosomes. Therefore, enightened by the DNA spicing system[3], two more genetic operators, i.e., eongation operator and deetion operator are introduced. The eongation operator is used to add a nove node, and a random nonzero vector is created as described in Eq.(), whereas the deetion operator is utiized to repace the existing unreasonabe node c (,,, i ci ci c in ) with a zero vector. Suppose r is a random number between 0 and, when p e >r, the eongation operator is executed. In the worst case (the number of hidden nodes in each chromosome add up L to D), the compexity is O( ( D nr ) n = ). The deetion operator is executed in the pace of existing unreasonabe node, which is determined by the number of zeros in the node centers. If the number of zeros goes beyond, the node is considered as an unreasonabe one and wi be repaced by deetion operator. In the worst case (a nodes are deeted), the computationa compexity is O( nr n) L. =.4 The procedure of spicing system based GA The whoe processes of the optimization of RBF networks are described in the foowing steps. Step : Generate the code for L chromosomes randomy in the search space. Step : Cacuate the corresponding L weight vectors using RLS method and compute the performance index f for each individua. Step 3: Seect the chromosomes for the generation of new chromosomes of the next generation according to the seection operator. Figure Schematic diagram of the crossover operation Apri, 007

4 Spicing System Based Genetic Agorithms for Deveoping RBF Networks Modes 43 Step 4: Choose a point randomy in the range [, n ], and exchange the codes of the pairs of chromosomes reproduced in Step 3. Repeat this for a the p c L/ pairs of parents. Step 5: Impement mutation, repace the eement of the current chromosome with the nove eement generated by Eq.(). Step 6: Execute the spicing operators, when the conditions are met. Step 7: Repeat Steps to 6 unti a termination criterion is met. This can be the set of maximum number of evoutions, or the set of minimum improvement of the best performance in successive generations. Moreover, Eitism, the incusion of the best current set in the next popuation, is used throughout. Considering the compexity of one generation in the whoe procedure, the basic operations of one generation being performed and the worst case compexities associated with it, are as foows: () L RLS soutions of weight vector is L O( N( nr) ) ; = () Seection operator is O(LN ); (3) Crossover operator is O(LnD/), (4) Mutation operator is O(LnD); L (5) Eongation operator is ( ( O D n r ) n = ), and L (6) Deetion operator is O( n rn = ). As can be seen, the overa compexity of the ( ) L above agorithm is O N( nr) = number of nodes ( ) r. Once the n in the hidden ayer increases, the computation significanty increases. Moreover, as the eitism strategy is adopted throughout the whoe evoutionary procedure, the proposed GA can be competey converged[8]. 3 SIMULATION RESULTS The performance of the proposed methodoogy is evauated by appying it on two different systems: a noninear benchmark probem described by a discrete input output mode and a noninear continuous stirred tank reactor. 3. Simuation tests on a discrete input output mode The discrete input output mode is described as foows[9]. yk ( ) = yk ( ) yk ( ) yk ( 3) uk ( ) [ yk ( 3) ] + u( k ) + yk ( ) + yk ( 3) (6) where πk sin( ), k uk ( ) = πk πk 0.8sin( ) + 0.sin( ), k > The objective of this appication is to utiize the proposed methodoogy to obtain suitabe RBF configuration for modeing the aforementioned system. The input of RBF mode consists of two previous vaues of u and three previous vaues of y. x ( k) = [ u( k ) u( k ) y( k ) y( k ) y( k 3)] (7) The proposed methodoogy is compared with nearest neighbor custering method and k-means custering method, which are used to train the centers of RBF network. 000 data points are produced according to Eq.(6), where the first 500 data points are used to optimize the RBF networks, and the other 500 data points are used to test the performance of the given RBF networks. The operationa parameters used by the proposed agorithm can be seen in Tabe. Tabe GA parameters used in the discrete mode and CSTR exampes Agorithm parameters Discrete exampe CSTR exampe number of chromosomes L maximum of hidden nodes D number of generations G probabiity of crossover p c probabiity of mutation p m probabiity of eongation p e The simuation resuts obtained using the above two methods and the proposed GA are shown in Figs. 5. Fig. shows the fitting curve of prediction vaues and rea vaues using nearest neighbor custering method, and the pots of the estimation error are depicted in Figs.3 5. As the nearest neighbor custering method was used for cacuating the number of Gaussian functions and their corresponding function centers, σ shoud be set in advance. In Fig.3, σ is seected as 0. using tria and error method. In Fig.4, the structure of RBF network is obtained using k-means custering method with 0 custers in terms of nearest neighbor custering method, and σ is optimized using SGA. The number of hidden nodes in RBF network and the sum of absoute vaues of modeing error (S) using the above 3 methods are isted in Tabe. By comparing the resuts in Tabe and the pots in Figs.3 5, it can be observed that the proposed approach minimizes the error to a sma extent using an amost equivaent network structure. Moreover, it is needess to set the network parameter, such as σ to 0. and custers to 0. Tabe Simuation resuts using the 3 different methods Methods Number of hidden nodes S nearest neighbor custering k-means custering & SGA proposed GA Chin. J. Ch. E. 5() 40 (007)

5 44 Chin. J. Ch. E. (Vo. 5, No.) Figure RBF network predictions using nearest neighbor custering method neura predictions; rea vaues Figure 3 Estimation of error using nearest neighbor custering method Figure 4 Estimation of error using k-means custering method and SGA Figure 5 Estimation error using proposed method 3. Simuation tests on a continuous stirred tank reactor In this study, a nonisotherma CSTR process is considered, which is characterized using the foowing dynamic equations[0]: x x = x + Da( x) exp + x ϕ x x = ( + δ ) x + BDa( x) exp + δ u + x ϕ (8) where x and x represent the dimensioness reactant concentration and reactant temperature, respectivey, the physica parameters in the CSTR mode equations are: Da, φ, B and δ, which correspond to the Damökher number, the activated energy, heat of reaction, and heat transfer coefficient, respectivey. The vaues of the system parameters can be obtained as: Da= 0.07, φ=0, B=8, δ=0.3. The contro input, u, is the dimensioness temperature of the cooant. Because of the hard input constraints, u ies between -5 and 5. The objective is to buid discrete dynamic modes for predicting the state variabe x and x using the input output data. The input vector of RBF network mode is seected as foows. x ( k) = [ u( k ) u( k ) u( k 3) y( k) y( k )] (9) The proposed method is appied to optimize both the structure and the centers of RBF networks. As the probem is reativey compex, the number of hidden nodes obtained using nearest neighbor custering is 69 corresponding to σ=0.3, which is too compicated to be adopted. Hence, the resuts of the proposed agorithm are compared with another RBF identification scheme, i.e., the improved S&A GA in Ref.[]. The same radia basis function is adopted and the maximum number of hidden nodes is chosen as 50. For a simuations that foow, a set of 700 input output data points are created by randomy seecting the vaues of the input variabe within the space [-5, 5]. The first 300 data are used in the training procedure to cacuate the connection weights; the second 00 data are aso used during the training process to evauate the RBF network in each generation, whereas the remaining 00 data are used to test the efficiency of the utimate RBF network. To test the generaization performance of RBF networks, the vaues of the output variabes are modified by adding random noise chosen from a uniform distribution at the interva [-3%, +3%] of the maximum vaues of the given variabe. To evauate the approximation capabiity and generaization performance, both the training error and testing error are compared as shown in Figs.6 9. Once the best structure and the centers of RBF network are optimized using GA according to the first and second data sets, the weights between the hidden ayer and the output ayer are updated using RLS method according to the second 00 data, the training errors are thus obtained, and then, the weights are fixed and the testing errors are cacuated in terms of the third 00 data. Figs.6 and 8 show the responses of RBF network predictor optimized using S&A GA with RLS method because the LS method in Ref.[] coud not aways obtain the inverse of the matrix. By comparing with Figs.7 and 9 through RBF networks using S&A GA, training errors are obtained, which are smaer than that by the use of proposed GA, i.e., the sum of absoute vaues of the training error (S ) using S&A GA is smaer than that by the use of proposed GA, and they demand much more hidden nodes regardess of the compexity of the Apri, 007

6 Spicing System Based Genetic Agorithms for Deveoping RBF Networks Modes 45 Figure 6 Training and testing error for x using S&A GA in RBF network Figure 8 Training and testing error for x using S&A GA in RBF network Figure 7 Training and testing error for x using proposed GA in RBF network Figure 9 Training and testing error for x using proposed GA in RBF network network structure. Moreover, the sum of the absoute vaue of the testing error (S ) are quite simiar, and some points of testing error in Figs.6 and 8 are smaer than that in Figs.7 and 9, which can aso be testified using the maximum testing error (E max ). This may be caused by the over-fitting of RBF network with severa hidden nodes. Tabe 3 shows that, as the number of hidden nodes using S&A GA is much more than that by the use of proposed GA, the runtime has markedy increased, which is consistent with the anaysis of computationa compexity. A agorithms are programmed by MATLAB7.0 using the computer with Ceeron(R) CPU.4GHz and RAM 56MB. 4 CONCLUSIONS This artice presents a spicing system based GA for the optimization of both structure and centers of the RBF network mode. This agorithm is based on Chin. J. Ch. E. 5() 40 (007)

7 46 Chin. J. Ch. E. (Vo. 5, No.) Tabe 3 The simuation resuts using two improved GA x x Methods Number of nodes S S E max Runtime, s Number of nodes S S E max Runtime, s S&A GA proposed GA input-output data, and its objective function considers both approximation capabiity and generaization performance of the RBF network. In this manner, the network simutaneousy retains a reasonabe size and effectivey describes the whoe system. Different simuations of benchmark probem and typica noninear dynamic CSTR system are performed to iustrate the effectiveness of the proposed method. The resuts show that this method can produce highy accurate prediction and keep a reativey simpe network structure. NOMENCLATURE B heat of the reaction C the th n-by-d chromosome matrix c i the ith node center vector D maximum number of the hidden nodes Da Damökher number E max maximum of the testing error f the fitness function G maximum number of generations J the objective function K n r dimension assistant vector in the th network in RLS agorithm L size of the popuation N maximum iterative time n number of the input nodes n r number of hidden nodes of the th network P nr -by- n r assistant matrix in the th network in RLS agorithm p c probabiity of crossover p e probabiity of eongation p m probabiity of mutation r random number between 0 and S sum of the absoute vaue of the modeing error S sum of the absoute vaue of the training error S sum of the absoute vaue of the testing error u contro input of the actua system w weight vector of the th RBF network X r n r dimension output vector of the hidden ayer in RLS agorithm X N n-dimension input vectors X N n-dimension input vectors x input vector of the RBF network x reactant concentration x reactor temperature Y N output vaues of the system Y N output vaues of the system y output vaue of the actua system δ heat transfer coefficient σ width of the Gaussian function φ activated energy REFERENCES Park, J., Sandberg, I., Universa approximation using radia basis function networks, Neura Comput., 3(), 46 57(99). Prechet, L., Automatic eary stopping using cross vaidation: quantifying the criteria, Neura Network., (4), (998). 3 Aexandridis, A., Sarimveis, H., Bafas, G., A new agorithm for onine structure and parameter adaptation of RBF networks, Neura Network., 6(7), (003). 4 Hoand, J.H., Adaptation in Natura and Artificia Systems, MIT Press, Cambridge, MA, USA (99). 5 Wang, Y., Yao, P., Simuation and optimization for thermay couped distiation using artificia neura network and genetic agorithm, Chin. J. Chem. Eng., (3), 307 3(003). 6 Yang, T., Lin, H.C., Chen, M.L., Metamodeing approach in soving the machine parameters optimization probem using neura network and genetic agorithms: A case study, Robot Comput. Integrated Manuf., (4), 3 33(006). 7 Banco, A., Degado, M., Pegaajar, M.C., Rea-coded genetic agorithm for training recurrent neura networks, Neura Network., 4(), 93 05(00). 8 Degado, M., Pegaajar, M.C., A mutiobjective genetic agorithm for obtaining the optima size of a recurrent neura network for grammatica inference, Pattern Recognit., 38(9), (005). 9 Vesin, J.M., Gruter, R., Mode seection using a simpex reproduction genetic agorithm, Signa Process., 78(3), 3 37(999). 0 Esposito, A., Marinaro, M., Oricchio, D., Scarpetta, S., Approximation of continuous and discontinuous mappings by a growing neura RBF-based agorithm, Neura Network., 3(6), (000). Sarimveis, H., Aexandridis, A., Mazarakis, S., Bafas, G., A new agorithm for deveoping dynamic radia basis function neura network modes based on genetic agorithms, Comput. Chem. Eng., 8(), 09 7(004). Chen, S., Cowan, C.F.N., Grant, P.M., Orthogona east squares earning agorithm for radia basis function networks, IEEE Trans. Neura Netw., (), (99). 3 Li, S.C., Xu, J., Pan, L.Q., Operationa rues for digita coding of RNA sequences based on DNA computing in high dimensiona space, Bu. Sci. Tech. Soc., 8(6), (003). 4 Jonoska, N., Seeman, N.C., DNA Computing, Springer-Verag, New York (00). 5 Pham, D.T., Dimov, S.S., Nguyen, C.D., Seection of K in k-means custering, Proc. Inst. Mech. Eng. C. Mech. Eng. Sci., 9(), 03 9(005). 6 Zhang, X., Song, J., RBF neura networks based on dynamic nearest neighbor-custering agorithm and its appication in prediction of MH-Ni battery capacity, Transactions of China Eectrotechnica Society, 0(), 84 87(005). 7 Hou, Y.B., Wang M., Wang, L.Q., System Identification and Its MATLAB Simuation, Science Press, Beijing (004). 8 Li, M.Q., Kou, J.S., Basic Theories and Appications of Genetic Agorithm, Science Press, Beijing (00). 9 Liu, G.P., Kadirkamanathan, V., Biings, S.A., On-ine identification of noninear systems using Voterra poynomia basis function neura networks, Neura Netw., (9), (998). 0 Chen, C.T., Peng, S.T., Learning contro of process systems with hard input constraints, J. Process Contro, 9(), 5 60(999). Apri, 007

Secure Network Coding with a Cost Criterion

Secure Network Coding with a Cost Criterion Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu

More information

Face Hallucination and Recognition

Face Hallucination and Recognition Face Haucination and Recognition Xiaogang Wang and Xiaoou Tang Department of Information Engineering, The Chinese University of Hong Kong {xgwang1, xtang}@ie.cuhk.edu.hk http://mmab.ie.cuhk.edu.hk Abstract.

More information

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH Ufuk Cebeci Department of Industria Engineering, Istanbu Technica University, Macka, Istanbu, Turkey - ufuk_cebeci@yahoo.com Abstract An Enterprise

More information

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0 IEEE DISTRIBUTED SYSTEMS ONLINE 1541-4922 2005 Pubished by the IEEE Computer Society Vo. 6, No. 5; May 2005 Editor: Marcin Paprzycki, http://www.cs.okstate.edu/%7emarcin/ Book Reviews: Java Toos and Frameworks

More information

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing. Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services

More information

Vendor Performance Measurement Using Fuzzy Logic Controller

Vendor Performance Measurement Using Fuzzy Logic Controller The Journa of Mathematics and Computer Science Avaiabe onine at http://www.tjmcs.com The Journa of Mathematics and Computer Science Vo.2 No.2 (2011) 311-318 Performance Measurement Using Fuzzy Logic Controer

More information

Maintenance activities planning and grouping for complex structure systems

Maintenance activities planning and grouping for complex structure systems Maintenance activities panning and grouping for compex structure systems Hai Canh u, Phuc Do an, Anne Barros, Christophe Berenguer To cite this version: Hai Canh u, Phuc Do an, Anne Barros, Christophe

More information

An Idiot s guide to Support vector machines (SVMs)

An Idiot s guide to Support vector machines (SVMs) An Idiot s guide to Support vector machines (SVMs) R. Berwick, Viage Idiot SVMs: A New Generation of Learning Agorithms Pre 1980: Amost a earning methods earned inear decision surfaces. Linear earning

More information

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements A Suppier Evauation System for Automotive Industry According To Iso/Ts 16949 Requirements DILEK PINAR ÖZTOP 1, ASLI AKSOY 2,*, NURSEL ÖZTÜRK 2 1 HONDA TR Purchasing Department, 41480, Çayırova - Gebze,

More information

Pricing Internet Services With Multiple Providers

Pricing Internet Services With Multiple Providers Pricing Internet Services With Mutipe Providers Linhai He and Jean Warand Dept. of Eectrica Engineering and Computer Science University of Caifornia at Berkeey Berkeey, CA 94709 inhai, wr@eecs.berkeey.edu

More information

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks Simutaneous Routing and Power Aocation in CDMA Wireess Data Networks Mikae Johansson *,LinXiao and Stephen Boyd * Department of Signas, Sensors and Systems Roya Institute of Technoogy, SE 00 Stockhom,

More information

Teamwork. Abstract. 2.1 Overview

Teamwork. Abstract. 2.1 Overview 2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and

More information

A Latent Variable Pairwise Classification Model of a Clustering Ensemble

A Latent Variable Pairwise Classification Model of a Clustering Ensemble A atent Variabe Pairwise Cassification Mode of a Custering Ensembe Vadimir Berikov Soboev Institute of mathematics, Novosibirsk State University, Russia berikov@math.nsc.ru http://www.math.nsc.ru Abstract.

More information

With the arrival of Java 2 Micro Edition (J2ME) and its industry

With the arrival of Java 2 Micro Edition (J2ME) and its industry Knowedge-based Autonomous Agents for Pervasive Computing Using AgentLight Fernando L. Koch and John-Jues C. Meyer Utrecht University Project AgentLight is a mutiagent system-buiding framework targeting

More information

FRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS. Karl Skretting and John Håkon Husøy

FRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS. Karl Skretting and John Håkon Husøy FRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS Kar Skretting and John Håkon Husøy University of Stavanger, Department of Eectrica and Computer Engineering N-4036 Stavanger,

More information

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server

More information

Multi-Robot Task Scheduling

Multi-Robot Task Scheduling Proc of IEEE Internationa Conference on Robotics and Automation, Karsruhe, Germany, 013 Muti-Robot Tas Scheduing Yu Zhang and Lynne E Parer Abstract The scheduing probem has been studied extensivey in

More information

3.5 Pendulum period. 2009-02-10 19:40:05 UTC / rev 4d4a39156f1e. g = 4π2 l T 2. g = 4π2 x1 m 4 s 2 = π 2 m s 2. 3.5 Pendulum period 68

3.5 Pendulum period. 2009-02-10 19:40:05 UTC / rev 4d4a39156f1e. g = 4π2 l T 2. g = 4π2 x1 m 4 s 2 = π 2 m s 2. 3.5 Pendulum period 68 68 68 3.5 Penduum period 68 3.5 Penduum period Is it coincidence that g, in units of meters per second squared, is 9.8, very cose to 2 9.87? Their proximity suggests a connection. Indeed, they are connected

More information

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation

More information

Figure 1. A Simple Centrifugal Speed Governor.

Figure 1. A Simple Centrifugal Speed Governor. ENGINE SPEED CONTROL Peter Westead and Mark Readman, contro systems principes.co.uk ABSTRACT: This is one of a series of white papers on systems modeing, anaysis and contro, prepared by Contro Systems

More information

Electronic Commerce Research and Applications

Electronic Commerce Research and Applications Eectronic Commerce Research and Appications 8 (2009) 63 77 Contents ists avaiabe at ScienceDirect Eectronic Commerce Research and Appications journa homepage: www.esevier.com/ocate/ecra Forecasting market

More information

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies ISM 602 Dr. Hamid Nemati Objectives The idea Dependencies Attributes and Design Understand concepts normaization (Higher-Leve Norma Forms) Learn how to normaize tabes Understand normaization and database

More information

Network/Communicational Vulnerability

Network/Communicational Vulnerability Automated teer machines (ATMs) are a part of most of our ives. The major appea of these machines is convenience The ATM environment is changing and that change has serious ramifications for the security

More information

GREEN: An Active Queue Management Algorithm for a Self Managed Internet

GREEN: An Active Queue Management Algorithm for a Self Managed Internet : An Active Queue Management Agorithm for a Sef Managed Internet Bartek Wydrowski and Moshe Zukerman ARC Specia Research Centre for Utra-Broadband Information Networks, EEE Department, The University of

More information

eg Enterprise vs. a Big 4 Monitoring Soution: Comparing Tota Cost of Ownership Restricted Rights Legend The information contained in this document is confidentia and subject to change without notice. No

More information

Chapter 3: e-business Integration Patterns

Chapter 3: e-business Integration Patterns Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?

More information

Australian Bureau of Statistics Management of Business Providers

Australian Bureau of Statistics Management of Business Providers Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad

More information

IT Governance Principles & Key Metrics

IT Governance Principles & Key Metrics IT Governance Principes & Key Metrics Smawood Maike & Associates, Inc. 9393 W. 110th Street 51 Corporate Woods, Suite 500 Overand Park, KS 66210 Office: 913-451-6790 Good governance processes that moves

More information

COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION

COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION Františe Mojžíš Department of Computing and Contro Engineering, ICT Prague, Technicá, 8 Prague frantise.mojzis@vscht.cz Abstract This

More information

SPOTLIGHT. A year of transformation

SPOTLIGHT. A year of transformation WINTER ISSUE 2014 2015 SPOTLIGHT Wecome to the winter issue of Oasis Spotight. These newsetters are designed to keep you upto-date with news about the Oasis community. This quartery issue features an artice

More information

802.11 Power-Saving Mode for Mobile Computing in Wi-Fi hotspots: Limitations, Enhancements and Open Issues

802.11 Power-Saving Mode for Mobile Computing in Wi-Fi hotspots: Limitations, Enhancements and Open Issues 802.11 Power-Saving Mode for Mobie Computing in Wi-Fi hotspots: Limitations, Enhancements and Open Issues G. Anastasi a, M. Conti b, E. Gregori b, A. Passarea b, Pervasive Computing & Networking Laboratory

More information

Fixed income managers: evolution or revolution

Fixed income managers: evolution or revolution Fixed income managers: evoution or revoution Traditiona approaches to managing fixed interest funds rey on benchmarks that may not represent optima risk and return outcomes. New techniques based on separate

More information

University of Southern California

University of Southern California Master of Science in Financia Engineering Viterbi Schoo of Engineering University of Southern Caifornia Dia 1-866-469-3239 (Meeting number 924 898 113) to hear the audio portion, or isten through your

More information

Leakage detection in water pipe networks using a Bayesian probabilistic framework

Leakage detection in water pipe networks using a Bayesian probabilistic framework Probabiistic Engineering Mechanics 18 (2003) 315 327 www.esevier.com/ocate/probengmech Leakage detection in water pipe networks using a Bayesian probabiistic framework Z. Pouakis, D. Vaougeorgis, C. Papadimitriou*

More information

ONE of the most challenging problems addressed by the

ONE of the most challenging problems addressed by the IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, VOL. 44, NO. 9, SEPTEMBER 2006 2587 A Mutieve Context-Based System for Cassification of Very High Spatia Resoution Images Lorenzo Bruzzone, Senior Member,

More information

Design of Follow-Up Experiments for Improving Model Discrimination and Parameter Estimation

Design of Follow-Up Experiments for Improving Model Discrimination and Parameter Estimation Design of Foow-Up Experiments for Improving Mode Discrimination and Parameter Estimation Szu Hui Ng 1 Stephen E. Chick 2 Nationa University of Singapore, 10 Kent Ridge Crescent, Singapore 119260. Technoogy

More information

A quantum model for the stock market

A quantum model for the stock market A quantum mode for the stock market Authors: Chao Zhang a,, Lu Huang b Affiiations: a Schoo of Physics and Engineering, Sun Yat-sen University, Guangzhou 5175, China b Schoo of Economics and Business Administration,

More information

SQL. Ilchul Yoon Assistant Professor State University of New York, Korea. on tables. describing schema. CSE 532 Theory of Database Systems

SQL. Ilchul Yoon Assistant Professor State University of New York, Korea. on tables. describing schema. CSE 532 Theory of Database Systems CSE 532 Theory of Database Systems Lecture 03 SQL Ichu Yoon Assistant Professor State University of New York, Korea Adapted from book authors sides SQL Language for describing database schema & operations

More information

ACO and SVM Selection Feature Weighting of Network Intrusion Detection Method

ACO and SVM Selection Feature Weighting of Network Intrusion Detection Method , pp. 129-270 http://dx.doi.org/10.14257/ijsia.2015.9.4.24 ACO and SVM Seection Feature Weighting of Network Intrusion Detection Method Wang Xingzhu Furong Coege Hunan, University of Arts and Science,

More information

Integrating Risk into your Plant Lifecycle A next generation software architecture for risk based

Integrating Risk into your Plant Lifecycle A next generation software architecture for risk based Integrating Risk into your Pant Lifecyce A next generation software architecture for risk based operations Dr Nic Cavanagh 1, Dr Jeremy Linn 2 and Coin Hickey 3 1 Head of Safeti Product Management, DNV

More information

Presented at the 107th Convention 1999 September 24-27 New York

Presented at the 107th Convention 1999 September 24-27 New York Room Simuation for Mutichanne Fim and Music 4993 (B-2) Knud Bank Christensen and Thomas Lund TC Eectronic A/S DK-8240 Risskov, Denmark Presented at the 107th Convention 1999 September 24-27 New York This

More information

Virtual trunk simulation

Virtual trunk simulation Virtua trunk simuation Samui Aato * Laboratory of Teecommunications Technoogy Hesinki University of Technoogy Sivia Giordano Laboratoire de Reseaux de Communication Ecoe Poytechnique Federae de Lausanne

More information

Oracle. L. Ladoga Rybinsk Res. Volga. Finland. Volga. Dnieper. Dnestr. Danube. Lesbos. Auditing Oracle Applications Peloponnesus

Oracle. L. Ladoga Rybinsk Res. Volga. Finland. Volga. Dnieper. Dnestr. Danube. Lesbos. Auditing Oracle Applications Peloponnesus N o r w e g i a n S e a White 60ûN ATLANTIC OCEAN UNITED KINGDOM Rio Douro Hebrid Bay of Biscay Garonne Faroe Isands Shetand Isands Orkney Isands North Loire ine Rhone Rhine Po Ebe Adriatic Batic Guf of

More information

The Use of Cooling-Factor Curves for Coordinating Fuses and Reclosers

The Use of Cooling-Factor Curves for Coordinating Fuses and Reclosers he Use of ooing-factor urves for oordinating Fuses and Recosers arey J. ook Senior Member, IEEE S& Eectric ompany hicago, Iinois bstract his paper describes how to precisey coordinate distribution feeder

More information

WINMAG Graphics Management System

WINMAG Graphics Management System SECTION 10: page 1 Section 10: by Honeywe WINMAG Graphics Management System Contents What is WINMAG? WINMAG Text and Graphics WINMAG Text Ony Scenarios Fire/Emergency Management of Fauts & Disabement Historic

More information

Research on Risk of Supply Chain Finance of Small and Medium-Sized Enterprises Based on Fuzzy Ordinal Regression Support Vector Machine

Research on Risk of Supply Chain Finance of Small and Medium-Sized Enterprises Based on Fuzzy Ordinal Regression Support Vector Machine www.ccsenet.org/ibm Internationa Journa of Business and Management Vo. 7, No. 8; Apri 202 Research on Risk of Suppy Chain Finance of Sma and Medium-Sized Enterprises Based on Fuzzy Ordina Regression Support

More information

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441

More information

A train dispatching model based on fuzzy passenger demand forecasting during holidays

A train dispatching model based on fuzzy passenger demand forecasting during holidays Journa of Industria Engineering and Management JIEM, 2013 6(1):320-335 Onine ISSN: 2013-0953 Print ISSN: 2013-8423 http://dx.doi.org/10.3926/jiem.699 A train dispatching mode based on fuzzy passenger demand

More information

Measuring operational risk in financial institutions

Measuring operational risk in financial institutions Measuring operationa risk in financia institutions Operationa risk is now seen as a major risk for financia institutions. This paper considers the various methods avaiabe to measure operationa risk, and

More information

Betting on the Real Line

Betting on the Real Line Betting on the Rea Line Xi Gao 1, Yiing Chen 1,, and David M. Pennock 2 1 Harvard University, {xagao,yiing}@eecs.harvard.edu 2 Yahoo! Research, pennockd@yahoo-inc.com Abstract. We study the probem of designing

More information

CLOUD service providers manage an enterprise-class

CLOUD service providers manage an enterprise-class IEEE TRANSACTIONS ON XXXXXX, VOL X, NO X, XXXX 201X 1 Oruta: Privacy-Preserving Pubic Auditing for Shared Data in the Coud Boyang Wang, Baochun Li, Member, IEEE, and Hui Li, Member, IEEE Abstract With

More information

A New Statistical Approach to Network Anomaly Detection

A New Statistical Approach to Network Anomaly Detection A New Statistica Approach to Network Anomay Detection Christian Caegari, Sandrine Vaton 2, and Michee Pagano Dept of Information Engineering, University of Pisa, ITALY E-mai: {christiancaegari,mpagano}@ietunipiit

More information

LADDER SAFETY Table of Contents

LADDER SAFETY Table of Contents Tabe of Contents SECTION 1. TRAINING PROGRAM INTRODUCTION..................3 Training Objectives...........................................3 Rationae for Training.........................................3

More information

Best Practices for Push & Pull Using Oracle Inventory Stock Locators. Introduction to Master Data and Master Data Management (MDM): Part 1

Best Practices for Push & Pull Using Oracle Inventory Stock Locators. Introduction to Master Data and Master Data Management (MDM): Part 1 SPECIAL CONFERENCE ISSUE THE OFFICIAL PUBLICATION OF THE Orace Appications USERS GROUP spring 2012 Introduction to Master Data and Master Data Management (MDM): Part 1 Utiizing Orace Upgrade Advisor for

More information

Let s get usable! Usability studies for indexes. Susan C. Olason. Study plan

Let s get usable! Usability studies for indexes. Susan C. Olason. Study plan Let s get usabe! Usabiity studies for indexes Susan C. Oason The artice discusses a series of usabiity studies on indexes from a systems engineering and human factors perspective. The purpose of these

More information

Cooperative Content Distribution and Traffic Engineering in an ISP Network

Cooperative Content Distribution and Traffic Engineering in an ISP Network Cooperative Content Distribution and Traffic Engineering in an ISP Network Wenjie Jiang, Rui Zhang-Shen, Jennifer Rexford, Mung Chiang Department of Computer Science, and Department of Eectrica Engineering

More information

Advantages and Disadvantages of Sampling. Vermont ASQ Meeting October 26, 2011

Advantages and Disadvantages of Sampling. Vermont ASQ Meeting October 26, 2011 Advantages and Disadvantages of Samping Vermont ASQ Meeting October 26, 2011 Jeffrey S. Soomon Genera Dynamics Armament and Technica Products, Inc. Wiiston, VT 05495 Outine I. Definition and Exampes II.

More information

An Integrated Data Management Framework of Wireless Sensor Network

An Integrated Data Management Framework of Wireless Sensor Network An Integrated Data Management Framework of Wireess Sensor Network for Agricutura Appications 1,2 Zhao Liang, 2 He Liyuan, 1 Zheng Fang, 1 Jin Xing 1 Coege of Science, Huazhong Agricutura University, Wuhan

More information

Application-Aware Data Collection in Wireless Sensor Networks

Application-Aware Data Collection in Wireless Sensor Networks Appication-Aware Data Coection in Wireess Sensor Networks Xiaoin Fang *, Hong Gao *, Jianzhong Li *, and Yingshu Li +* * Schoo of Computer Science and Technoogy, Harbin Institute of Technoogy, Harbin,

More information

Ricoh Healthcare. Process Optimized. Healthcare Simplified.

Ricoh Healthcare. Process Optimized. Healthcare Simplified. Ricoh Heathcare Process Optimized. Heathcare Simpified. Rather than a destination that concudes with the eimination of a paper, the Paperess Maturity Roadmap is a continuous journey to strategicay remove

More information

Insertion and deletion correcting DNA barcodes based on watermarks

Insertion and deletion correcting DNA barcodes based on watermarks Kracht and Schober BMC Bioinformatics (2015) 16:50 DOI 10.1186/s12859-015-0482-7 METHODOLOGY ARTICLE Open Access Insertion and deetion correcting DNA barcodes based on watermarks David Kracht * and Steffen

More information

3.3 SOFTWARE RISK MANAGEMENT (SRM)

3.3 SOFTWARE RISK MANAGEMENT (SRM) 93 3.3 SOFTWARE RISK MANAGEMENT (SRM) Fig. 3.2 SRM is a process buit in five steps. The steps are: Identify Anayse Pan Track Resove The process is continuous in nature and handed dynamicay throughout ifecyce

More information

TCP/IP Gateways and Firewalls

TCP/IP Gateways and Firewalls Gateways and Firewas 1 Gateways and Firewas Prof. Jean-Yves Le Boudec Prof. Andrzej Duda ICA, EPFL CH-1015 Ecubens http://cawww.epf.ch Gateways and Firewas Firewas 2 o architecture separates hosts and

More information

Modeling a Scenario-based Distribution Network Design Problem in a Physical Internet-enabled open Logistics Web

Modeling a Scenario-based Distribution Network Design Problem in a Physical Internet-enabled open Logistics Web 4 th Internationa conference on Information Systems, Logistics and Suppy Chain Quebec City August 26-29, 2012 Modeing a Scenario-based Distribution Network Design Probem in a Physica Internet-enabed open

More information

PREFACE. Comptroller General of the United States. Page i

PREFACE. Comptroller General of the United States. Page i - I PREFACE T he (+nera Accounting Office (GAO) has ong beieved that the federa government urgenty needs to improve the financia information on which it bases many important decisions. To run our compex

More information

Oligopoly in Insurance Markets

Oligopoly in Insurance Markets Oigopoy in Insurance Markets June 3, 2008 Abstract We consider an oigopoistic insurance market with individuas who differ in their degrees of accident probabiities. Insurers compete in coverage and premium.

More information

Precise assessment of partial discharge in underground MV/HV power cables and terminations

Precise assessment of partial discharge in underground MV/HV power cables and terminations QCM-C-PD-Survey Service Partia discharge monitoring for underground power cabes Precise assessment of partia discharge in underground MV/HV power cabes and terminations Highy accurate periodic PD survey

More information

Risk Assessment Methods and Application in the Construction Projects

Risk Assessment Methods and Application in the Construction Projects Internationa Journa of Modern Engineering Research (IJMER) Vo.2, Issue.3, May-June 2012 pp-1081-1085 ISS: 2249-6645 Risk Assessment Methods and Appication in the Construction Projects DR. R. K. KASAL,

More information

Ricoh Legal. ediscovery and Document Solutions. Powerful document services provide your best defense.

Ricoh Legal. ediscovery and Document Solutions. Powerful document services provide your best defense. Ricoh Lega ediscovery and Document Soutions Powerfu document services provide your best defense. Our peope have aways been at the heart of our vaue proposition: our experience in your industry, commitment

More information

The growth of online Internet services during the past decade has

The growth of online Internet services during the past decade has IEEE DS Onine, Voume 2, Number 4 Designing an Adaptive CORBA Load Baancing Service Using TAO Ossama Othman, Caros O'Ryan, and Dougas C. Schmidt University of Caifornia, Irvine The growth of onine Internet

More information

The Comparison and Selection of Programming Languages for High Energy Physics Applications

The Comparison and Selection of Programming Languages for High Energy Physics Applications The Comparison and Seection of Programming Languages for High Energy Physics Appications TN-91-6 June 1991 (TN) Bebo White Stanford Linear Acceerator Center P.O. Box 4349, Bin 97 Stanford, Caifornia 94309

More information

Design and Analysis of a Hidden Peer-to-peer Backup Market

Design and Analysis of a Hidden Peer-to-peer Backup Market Design and Anaysis of a Hidden Peer-to-peer Backup Market Sven Seuken, Denis Chares, Max Chickering, Mary Czerwinski Kama Jain, David C. Parkes, Sidd Puri, and Desney Tan December, 2015 Abstract We present

More information

Load Balancing in Distributed Web Server Systems with Partial Document Replication *

Load Balancing in Distributed Web Server Systems with Partial Document Replication * Load Baancing in Distributed Web Server Systems with Partia Document Repication * Ling Zhuo Cho-Li Wang Francis C. M. Lau Department of Computer Science and Information Systems The University of Hong Kong

More information

STRATEGIC PLAN 2012-2016

STRATEGIC PLAN 2012-2016 STRATEGIC PLAN 2012-2016 CIT Bishopstown CIT Cork Schoo of Music CIT Crawford Coege of Art & Design Nationa Maritime Coege of Ireand Our Institute STRATEGIC PLAN 2012-2016 Cork Institute of Technoogy (CIT)

More information

Key Features of Life Insurance

Key Features of Life Insurance Key Features of Life Insurance Life Insurance Key Features The Financia Conduct Authority is a financia services reguator. It requires us, Aviva, to give you this important information to hep you to decide

More information

Overview of Health and Safety in China

Overview of Health and Safety in China Overview of Heath and Safety in China Hongyuan Wei 1, Leping Dang 1, and Mark Hoye 2 1 Schoo of Chemica Engineering, Tianjin University, Tianjin 300072, P R China, E-mai: david.wei@tju.edu.cn 2 AstraZeneca

More information

CI/SfB Ro8. (Aq) September 2012. The new advanced toughened glass. Pilkington Pyroclear Fire-resistant Glass

CI/SfB Ro8. (Aq) September 2012. The new advanced toughened glass. Pilkington Pyroclear Fire-resistant Glass CI/SfB Ro8 (Aq) September 2012 The new advanced toughened gass Pikington Pyrocear Fire-resistant Gass Pikington Pyrocear, fire-resistant screens in the façade: a typica containment appication for integrity

More information

Iterative Water-filling for Load-balancing in Wireless LAN or Microcellular Networks

Iterative Water-filling for Load-balancing in Wireless LAN or Microcellular Networks terative Water-fiing for Load-baancing in Wireess LAN or Microceuar Networks Jeremy K. Chen Theodore S. Rappaport Gustavo de Veciana Wireess Networking and Communications Group (WNCG), be University of

More information

Program Management Seminar

Program Management Seminar Program Management Seminar Program Management Seminar The word s best management schoos are noted for their superior program execution, high eves of customer satisfaction, and continuous program improvements.

More information

Enhanced continuous, real-time detection, alarming and analysis of partial discharge events

Enhanced continuous, real-time detection, alarming and analysis of partial discharge events DMS PDMG-RH DMS PDMG-RH Partia discharge monitor for GIS Partia discharge monitor for GIS Enhanced continuous, rea-time detection, aarming and anaysis of partia discharge events Unrivaed PDM feature set

More information

Fast b-matching via Sufficient Selection Belief Propagation

Fast b-matching via Sufficient Selection Belief Propagation Fast b-matching via Sufficient Seection Beief Propagation Bert Huang Computer Science Department Coumbia University New York, NY 127 bert@cs.coumbia.edu Tony Jebara Computer Science Department Coumbia

More information

APPENDIX 10.1: SUBSTANTIVE AUDIT PROGRAMME FOR PRODUCTION WAGES: TROSTON PLC

APPENDIX 10.1: SUBSTANTIVE AUDIT PROGRAMME FOR PRODUCTION WAGES: TROSTON PLC Appendix 10.1: substantive audit programme for production wages: Troston pc 389 APPENDIX 10.1: SUBSTANTIVE AUDIT PROGRAMME FOR PRODUCTION WAGES: TROSTON PLC The detaied audit programme production wages

More information

We focus on systems composed of entities operating with autonomous control, such

We focus on systems composed of entities operating with autonomous control, such Middeware Architecture for Federated Contro Systems Girish Baiga and P.R. Kumar University of Iinois at Urbana-Champaign A federated contro system (FCS) is composed of autonomous entities, such as cars,

More information

Human Capital & Human Resources Certificate Programs

Human Capital & Human Resources Certificate Programs MANAGEMENT CONCEPTS Human Capita & Human Resources Certificate Programs Programs to deveop functiona and strategic skis in: Human Capita // Human Resources ENROLL TODAY! Contract Hoder Contract GS-02F-0010J

More information

No. of Pages 15, Model 5G ARTICLE IN PRESS. Contents lists available at ScienceDirect. Electronic Commerce Research and Applications

No. of Pages 15, Model 5G ARTICLE IN PRESS. Contents lists available at ScienceDirect. Electronic Commerce Research and Applications Eectronic Commerce Research and Appications xxx (2008) xxx xxx 1 Contents ists avaiabe at ScienceDirect Eectronic Commerce Research and Appications journa homepage: www.esevier.com/ocate/ecra 2 Forecasting

More information

Bite-Size Steps to ITIL Success

Bite-Size Steps to ITIL Success 7 Bite-Size Steps to ITIL Success Pus making a Business Case for ITIL! Do you want to impement ITIL but don t know where to start? 7 Bite-Size Steps to ITIL Success can hep you to decide whether ITIL can

More information

Scheduling in Multi-Channel Wireless Networks

Scheduling in Multi-Channel Wireless Networks Scheduing in Muti-Channe Wireess Networks Vartika Bhandari and Nitin H. Vaidya University of Iinois at Urbana-Champaign, USA vartikab@acm.org, nhv@iinois.edu Abstract. The avaiabiity of mutipe orthogona

More information

(12) Patent Application Publication (10) Pub. N0.: US 2006/0105797 A1 Marsan et al. (43) Pub. Date: May 18, 2006

(12) Patent Application Publication (10) Pub. N0.: US 2006/0105797 A1 Marsan et al. (43) Pub. Date: May 18, 2006 (19) United States US 20060105797A (12) Patent Appication Pubication (10) Pub. N0.: US 2006/0105797 A1 Marsan et a. (43) Pub. Date: (54) METHOD AND APPARATUS FOR (52) US. C...... 455/522 ADJUSTING A MOBILE

More information

Spatio-Temporal Asynchronous Co-Occurrence Pattern for Big Climate Data towards Long-Lead Flood Prediction

Spatio-Temporal Asynchronous Co-Occurrence Pattern for Big Climate Data towards Long-Lead Flood Prediction Spatio-Tempora Asynchronous Co-Occurrence Pattern for Big Cimate Data towards Long-Lead Food Prediction Chung-Hsien Yu, Dong Luo, Wei Ding, Joseph Cohen, David Sma and Shafiqu Isam Department of Computer

More information

AN APPROACH TO THE STANDARDISATION OF ACCIDENT AND INJURY REGISTRATION SYSTEMS (STAIRS) IN EUROPE

AN APPROACH TO THE STANDARDISATION OF ACCIDENT AND INJURY REGISTRATION SYSTEMS (STAIRS) IN EUROPE AN APPROACH TO THE STANDARDSATON OF ACCDENT AND NJURY REGSTRATON SYSTEMS (STARS) N EUROPE R. Ross P. Thomas Vehice Safety Research Centre Loughborough University B. Sexton Transport Research Laboratory

More information

Early access to FAS payments for members in poor health

Early access to FAS payments for members in poor health Financia Assistance Scheme Eary access to FAS payments for members in poor heath Pension Protection Fund Protecting Peope s Futures The Financia Assistance Scheme is administered by the Pension Protection

More information

Pay-on-delivery investing

Pay-on-delivery investing Pay-on-deivery investing EVOLVE INVESTment range 1 EVOLVE INVESTMENT RANGE EVOLVE INVESTMENT RANGE 2 Picture a word where you ony pay a company once they have deivered Imagine striking oi first, before

More information

GRADUATE RECORD EXAMINATIONS PROGRAM

GRADUATE RECORD EXAMINATIONS PROGRAM VALIDITY and the GRADUATE RECORD EXAMINATIONS PROGRAM BY WARREN W. WILLINGHAM EDUCATIONAL TESTING SERVICE, PRINCETON, NEW JERSEY Vaidity and the Graduate Record Examinations Program Vaidity and the Graduate

More information

Market Design & Analysis for a P2P Backup System

Market Design & Analysis for a P2P Backup System Market Design & Anaysis for a P2P Backup System Sven Seuken Schoo of Engineering & Appied Sciences Harvard University, Cambridge, MA seuken@eecs.harvard.edu Denis Chares, Max Chickering, Sidd Puri Microsoft

More information

Chapter 2 Traditional Software Development

Chapter 2 Traditional Software Development Chapter 2 Traditiona Software Deveopment 2.1 History of Project Management Large projects from the past must aready have had some sort of project management, such the Pyramid of Giza or Pyramid of Cheops,

More information

PROPAGATION OF SURGE WAVES ON NON-HOMOGENEOUS TRANSMISSION LINES INDUCED BY LIGHTNING STROKE

PROPAGATION OF SURGE WAVES ON NON-HOMOGENEOUS TRANSMISSION LINES INDUCED BY LIGHTNING STROKE Advances in Eectrica and Eectronic Engineering 98 PROPAGATION OF SRGE WAVES ON NON-HOMOGENEOS TRANSMISSION LINES INDCED BY LIGHTNING STROKE Z. Benešová, V. Kotan WB Pisen, Facuty of Eectrica Engineering,

More information

Older people s assets: using housing equity to pay for health and aged care

Older people s assets: using housing equity to pay for health and aged care Key words: aged care; retirement savings; reverse mortgage; financia innovation; financia panning Oder peope s assets: using housing equity to pay for heath and aged care The research agenda on the ageing

More information

Discounted Cash Flow Analysis (aka Engineering Economy)

Discounted Cash Flow Analysis (aka Engineering Economy) Discounted Cash Fow Anaysis (aka Engineering Economy) Objective: To provide economic comparison of benefits and costs that occur over time Assumptions: Future benefits and costs can be predicted A Benefits,

More information

Traffic classification-based spam filter

Traffic classification-based spam filter Traffic cassification-based spam fiter Ni Zhang 1,2, Yu Jiang 3, Binxing Fang 1, Xueqi Cheng 1, Li Guo 1 1 Software Division, Institute of Computing Technoogy, Chinese Academy of Sciences, 100080, Beijing,

More information

Strengthening Human Resources Information Systems: Experiences from Bihar and Jharkhand, India

Strengthening Human Resources Information Systems: Experiences from Bihar and Jharkhand, India Strengthening Human Resources Information Systems: Experiences from Bihar and Jharkhand, India Technica Brief October 2012 Context India faces critica human resources (HR) chaenges in the heath sector,

More information