Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks

Size: px
Start display at page:

Download "Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks"

Transcription

1 Computer Commuicatios 30 (2007) wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio Sciece ad Egieerig, Northeaster Uiversity, Sheyag , Chia Key Lab of Broadbad Optical Fiber Trasmissio ad Commuicatio Networks, Uiversity of Electroic Sciece ad Techology of Chia, Chegdu , Chia Received 20 October 2006; received i revised form 5 December 2006; accepted 14 December 2006 Available olie 22 December 2006 Abstract I this paper, we ivestigate the protectio for survivable WDM optical etwork ad propose a ew algorithm called Quick Heuristic Routig (QHR) to tolerate the sigle-lik failure I QHR, each coectio request will be assiged to oe primary path ad multiple segmet-backup paths to guaratee the recovery time i the worst case Compared to previous algorithm, QHR ca yield sigificat improvemets i computatio time ad blockig probability Simulatios are show to be promisig Ó 2006 Elsevier BV All rights reserved Keywords: Optical etworks; Protectio; Segmet-backup path; Recovery time; Time complexity 1 Itroductio I Wavelegth-Divisio-Multiplexig (WDM) optical etworks, each wavelegth chael has the much high trasmissio rate ad the cosequece is that the fiber lik failure may lead to a lot of traffic blocked Therefore, the survivability is a key issue i WDM optical etworks ad also has bee studied for may years [1] Sice the siglelik failure is domiat i WDM optical etworks, previous papers mostly focus o studyig this failure sceario I order to improve the resource utilizatio ratio ad reduce the blockig probability, previous papers have proposed the shared protectio scheme [2,3], i which the backup resources/paths ca be shared if the correspodig primary resources/paths are lik disjoit I shared protectio scheme, the Shared Path Protectio (SPP) algorithm has the best resources utilizatio ratio while has the slowest recovery time, ad the Shared Lik Protectio (SLP) algorithm has the fastest recovery time while has the * Tel: address: haveball@263et worst resources utilizatio ratio Therefore, i order to yield fast recovery time meawhile obtai satisfactory resources utilizatio ratio, previous papers have proposed the Shared-Segmet Protectio (SSP) algorithm [4 ] I SSP, each coectio request will be first assiged to oe primary path Secod, the primary path will be divided to several u-overlapped segmet-primary paths Fially, each segmet-primary path will be, respectively, assiged to oe lik disjoit segmet-backup path Therefore, the recovery time ca be faster tha SPP ad the resources utilizatio ratio is also better tha SLP; that is, SSP ca make trade-offs betwee SPP ad SLP It is obvious that if we choose proper segmet-primary paths ad segmet-backup paths, the recovery time required by the coectio request ca be guarateed meawhile the resource utilizatio ratio also ca be satisfied However, the flaw of SSP is the much high time complexity sice i the worst case may potetial segmet-backup paths may be computed ad checked for guarateeig the recovery time High time complexity will restrict the efficiet computatio for dyamic coectio requests ad the cosequece is that some coectio requests may be blocked if the computatio time exceeds the establishmet time costraits /$ - see frot matter Ó 2006 Elsevier BV All rights reserved doi:101016/jcomcom

2 1332 L Guo / Computer Commuicatios 30 (2007) I this paper, we focus o the solvig this problem of SSP ad propose a ew algorithm called Quick Heuristic Routig (QHR) to achieve fast computatio for dyamic coectio requests Compared to SSP, the improvemet of QHR is to obtai multiple segmet-backup paths by ru oe time of Dijkstra s algorithm while SSP oly ca obtai oe segmet-backup path by ru oe time of Dijkstra s algorithm Therefore, QHR ca save sigificat computatio time for fidig the proper segmet-backup paths to guaratee the recovery time The rest of this paper is orgaized as follows Sectio 2 presets the etwork model, recovery time computatio, ad routig selectio method i SSP ad QHR Sectio 3 describes the heuristic process of QHR Sectio 4 presets the simulatio results Sectio 5 cocludes this paper 2 Problem statemet 21 Network model Assume the etwork has V odes ad L liks, ad each lik has W wavelegths Assume each coectio request arrives at the etwork orderly, ad there is oly a coectio request arrives at a time Assume the badwidth of each coectio request is oe wavelegth chael The shortest path algorithm, ie, Dijkstra s algorithm, is applied to compute the routes The followig otatios are itroduced j: fiber lik i the etwork c j : cost of lik j; it is determied by the curret state of etwork fw j : umbers of free wavelegths o lik j pw j : umbers of primary wavelegths o lik j bw j : umbers of backup wavelegths o lik j cr : coectio request p : primary path for cr b : backup path for cr sp s;dðcþ sb s;dðcþ : segmet-primary path of p from ode s to ode D(c) that is with c hops distat to the destiatio ode; especially, D(0) deotes the destiatio ode : segmet-backup path for sp s;dðcþ RTC: recovery time costrait; if the RTC caot be guarateed, the coectio request will be blocked ETC: establishmet time costrait; if the coectio request caot be established withi ETC, it will be blocked jxj: umber of elemets i set X 22 Recovery time The recovery time is defied as the time betwee the failure of the primary/segmet-primary path ad the time that the correspodig backup/segmet-backup path begis to work [3] The followig otatio is itroduced: D, the message processig time at a ode is 10 ls, correspodig to 1 GHz CPU time P, the propagatio delay o the lik, is 400 ls, correspodig to a lik legth of 0 km X, the time to cofigure, test, ad set up a OXC (Optical Cross-Coect) is 10 ls F, the time to detect the lik failure, is 10 ls I Fig 1, assume the segmet-primary path A B C D traverses the failed lik B C, the umber of hops from ode B to the segmet source ode A is k, ad the umber of hops of the backup path A E D is m The recovery procedure is preseted as follows If lik B C fails, the ed odes of lik B C, ie, lik source B ad lik destiatio C, sed failure messages to the segmet source ode A ad the segmet destiatio ode D, respectively The, the segmet source ode A seds a setup message to the segmet destiatio ode D alog the segmet-backup path A E D ad cofigures the OXCs at each itermediate ode alog the segmetbackup path A E D, because i shared protectio, at the time of the coectio setup, wavelegths are reserved for the backup path but OXCs are ot cofigured After receivig the setup message, the segmet destiatio ode D seds a cofirmatio message back to the segmet source ode A alog the segmet-backup path A E D, thus completig the recovery procedure Therefore, the recovery time ca be writte as T ¼ F þ kp þðk þ 1ÞD þ 2mP þ 2ðm þ 1ÞD þðm þ 1ÞX I order to tolerate ay sigle-lik failure, we should cosider the worst case; that is, the failure of the lik whose lik destiatio is the segmet destiatio ode Therefore, i the worst case k = h 1, where h deotes the total hops of the segmet-primary path, ad the recovery time ca be writte as T ¼ F þðh 1ÞP þ hd þ 2mP þ 2ðm þ 1ÞD þðm þ 1ÞX ð2þ I Eq (2), if T 6 RTC ca be satisfied, the recovery time required ca be guarateed It is obvious that smaller h ad m will lead to less T, ie, faster recovery time Therefore, if the curret recovery time caot be guarateed, we ca choose the shorter segmet-primary path ad A B E Fig 1 Illustratio of recovery time for shared protectio C D ð1þ

3 L Guo / Computer Commuicatios 30 (2007) segmet-backup path to reduce the T for guarateeig the recovery time 23 Routig selectio i SSP The process of SSP ca be briefly preseted as follows [4 7]: 1 Compute the primary path p 2 Compute the lik-disjoit backup path b If the recovery time ca be guarateed by p ad b, retur p ad b Else, letc 1,s source ode, ad go to step3 3 If D(c) s, choose the segmet-primary path sp s;dðcþ ad compute its correspodig backup path sb s;dðcþ If the recovery time ca be guarateed by sp s;dðcþ sb s;dðcþ, record sp s;dðcþ ad sb s;dðcþ If c = 0, retur the solutio Else, let s D(c), c 0, ad go back to step3 Else, let c c + 1 ad go back to step3 Else, o solutio ca be foud ad retur NULL ad Note that, i the process of SSP, if the computatio time exceeds the ETC costraits, the process will be stopped ad the coectio request will be blocked Accordig to the process of SSP, for the coectio request from source ode A to destiatio ode D i Fig 2, first, SSP computes the primary path A B C D through ruig oe time of Dijkstra s algorithm Secod, SSP computes the backup path A E F G D through ruig oe time of Dijkstra s algorithm Third, sice the recovery time caot be guarateed by the curret primary path A B C D ad backup path A E F G D, SSP computes the segmet-backup path A E F C through ruig oe time of Dijkstra s algorithm for the segmet-primary path A B C Fially, sice the recovery time caot be guarateed by the curret segmet-primary path A B C ad segmet-backup path A E F C, SSP computes the segmet-backup path A E B (two hops) through ruig oe time of Dijkstra s algorithm for the segmet-primary path A B (oe hop) that ca guaratee the recovery time Therefore, SSP will ru three times of Dijkstra s algorithm to obtai the first solutio with segmet-primary path A B ad segmet-backup path A E B Based o the same pricipal, SSP will ru two times of Dijkstra s algorithm to obtai the secod solutio with segmet-primary path B C ad segmet-backup path B F C, ad will ru oe time E F G of Dijkstra s algorithm to obtai the third solutio with segmet-primary path C D ad segmet-backup path C G D Therefore, the total times of ruig Dijkstra s algorithm to establish this coectio request for guarateeig the recovery time is seve (oe is for primary path ad six is for segmet-backup paths) 24 Routig selectio i QHR Compared to SSP, the mai advatage of QHR is that it has lower time complexity to obtai the same solutios with SSP I Fig 2, to fid the solutio with the segmet-backup path A E B for guarateeig the recovery time, SSP will ru three times of Dijkstra s algorithm However, the process of SSP is ot efficiet sice the three routes A E F G D, A E F C ad A E B ca be obtaied through ruig oe time of Dijkstra s algorithm First, QHR computes the primary path A B C D through ruig oe time of Dijkstra s algorithm Secod, after deletig the liks o the primary path SPP computes all routes (A E F G D, A E F C ad A E B) from the ode A to all other dowstream odes (B, C ad D) through ruig oe time of Dijkstra s algorithm, ad choose the segmet-primary path A B ad segmet-backup path A E B for guarateeig the recovery time With the same pricipal, QHR will ru oe time of Dijkstra s algorithm to obtai the secod solutio with segmet-primary path B C ad segmet-backup path B F C, ad will ru oe time of Dijkstra s algorithm to obtai the third solutio with segmet-primary path C D ad segmetbackup path C G D Therefore, the total times of ruig Dijkstra s algorithm to establish this coectio request for guarateeig the recovery time is four (oe is for primary path ad three is for segmet-backup paths) It is obvious that QHR ca save more computatio times tha SSP; that is, QHR is more efficiet tha previous SSP 3 Proposed heuristic algorithm 31 Process of QHR Iput: etwork iformatio; a ew cr from source ode s to destiatio ode d Output: the solutio for guarateeig the recovery time; or NULL if o solutio is available Step1: adjust the costs of all liks accordig to (3) Ru Dijkstra s algorithm to compute the least-cost primary path p from the source ode s ad the destiatio ode d If p has bee foud, go to step2 Else, block this coectio request ad retur NULL A B C Fig 2 Illustratio for routig selectio i SSP ad QHR; assume the recovery time ca be guarateed by the segmet-primary path with oe hop ad the segmet-backup path with two hops D >< þ1; If fw j ¼ 0 c j ¼ W þ 1 fw j =W ; other >: ð3þ

4 1334 L Guo / Computer Commuicatios 30 (2007) Step2: adjust the costs of all liks accordig to (4) Ru Dijkstra s algorithm to compute the least-cost routes from the source ode s to all other odes o p If the route from the source ode s to the destiatio ode d has bee foud, record this route as backup path b If the recovery time ca be guarateed by p ad b accordig to (2), update the etwork iformatio ad retur p ad b Else, let c 1 ad go to step3 Else, let c 1 ad go to step3 þ1; If ðj 2 p Þ or ðfw j þ bw j < v >< j Þ c j ¼ v j þ 1 bw j =W ; other >: ð4þ Step3: check the ode D(c) If D(c) s, choose the segmet-primary path sp s;dðcþ ad the segmet-backup path sb s;dðcþ obtaied i step2 or step4 If the recovery time ca be guarateed by sp s;dðcþ ad sb s;dðcþ accordig to (2), record sp s;dðcþ ad sb s;dðcþ If c = 0, update the etwork iformatio ad retur the solutio Else, let s D(c),c 0, ad go to step4; Else, let c c + 1 ad go back to step3 Else, o solutio ca be foud ad retur NULL Step4: Ru Dijkstra s algorithm to compute the leastcost segmet-backup paths from ode s to all other dowstream odes o p Go back to step3 primary path cotais V odes, the total umber of all potetial segmet-backup paths is V(V 1)/2 Thus, the time complexity of SSP is approximately O(V 2 + V 2 V(V 1)/2) = O(V 2 +(V 4 V 3 )/2) sice it will ru oe time of Dijkstra s algorithm to compute the primary path ad ru V(V 1)/2 times of Dijkstra s algorithm to compute the backup path ad all potetial segmet-backup paths However, QHR ca ru oe time of Dijkstra s algorithm to compute the primary path ad ru (V 1) times of Dijkstra s algorithm to compute the backup path ad all potetial segmet-backup paths Therefore, the time complexity of QHR is approximately O(V 2 + V 2 (V 1)) = O(V 3 ) It is obvious that the differece of time complexity betwee QHR ad SSP is expoetial, so that QHR is much faster tha SSP Therefore, i QHR more coectio requests ca be established withi ETC ad the cosequece is that QHR has lower blockig probability tha SSP 4 Simulatio results ad aalysis We simulate a dyamic etwork eviromet with the assumptios that coectio requests arrival accordig to a idepedet Poisso process with arrival rate b, ad the coectios holdig time is egative expoetially a Note that, i the process of QHR, if the computatio time exceeds the ETC costraits, the process will be stopped ad the coectio request will be blocked I Eq (3), we ca see that the liks that have more free resources (ie, fw j ) will have smaller lik-cost, ad the the primary paths will be favorable for traversig these liks ad the cosumed resources ca be more uiformly distributed to all liks Therefore, the load may be more balace I Eq (4), v j ¼ maxfjve jj; e 2 Lg that deotes the reserved backup resources o lik j We ca observe that the liks that have more reserved backup resources (ie, bw j ) have less lik-cost, so that the backup paths will be favorable for traversig these liks, ad the fewer ew backup resources eed to be assiged Therefore, the resource utilizatio ratio ca be improved b Compariso of QHR ad SSP I Sectios 23 ad 24, we ca see that QHR ad SSP ca obtai the same solutio for guarateeig the recovery time, ad the advatage of QHR is the lower time complexity From the process of SSP, i this worst case all potetial segmet-backup paths eed to be eumerated If the Fig 3 Test etworks: (a) US Natioal etwork ad (b) ARPANET

5 L Guo / Computer Commuicatios 30 (2007) a ACT Network Load i Erlag b ACT Network Load i Erlag Fig 4 Performace of ACT i (a) Natioal etwork ad (b) ARPANET a 2% 24% b 30% 25% BP 20% 16% 12% % BP 20% 15% 10% 4% 5% 0% 0% Network Load i Erlag Network Load i Erlag Fig 5 Performace of BP i (a) Natioal etwork ad (b) ARPANET distributed 1/l, the, the etwork load is b/l Erlag I simulatio, we assume l = 1 ad each required badwidth is oe wavelegth chael We assume there are o waitig queues i the etwork, so if a coectio request was blocked, it would be abadoed immediately The test etworks are US Natioal etwork ad ARPANET show i Fig 3, where each ode-pair is itercoected by a bi-directioal fiber lik that has 16 wavelegths ad each ode has the wavelegth coversio capacity Assume each lik legth is 0 km, the recovery time costrait (RTC) is 2 ms ad the establishmet time costrait (ETC) is 6ms The computer used i simulatio is cofigured with 1 GHz CPU ad 512 M RAM We compare the performaces of QHR ad SSP We first test the performace of Resource Utilizatio Ratio (RUR), which is the rate of the total backup resources to the total primary resources We fid that the values of RUR of QHR ad SSP are both about 70 9% The reaso for this is that QHR ad SSP ca fid the same solutio for guarateeig the recovery time (see Sectios 23 ad 24), ad the oly differece betwee them is the time complexity We secod evaluate the performace of Average Computatio Time (ACT) that is defied as the rate of the total times of ruig Dijkstra s algorithm for successfully establishig the coectio requests to the total umbers of successfully established coectio requests Smaller ACT meas faster computatio time I Fig 4, we ca see that the computatio time of QHR is much improved compared to SSP, ad the improvemet ratios are up to 92% ad 5% i Natioal etwork ad ARPANET, respectively The reaso for this is that QHR ca compute multiple segmet-backup paths by ruig oe time of Dijkstra s algorithm while SSP oly ca obtai oe segmet-backup path by ruig oe time of Dijkstra s algorithm Therefore, QHR ca save more computatio times to fid the proper segmet-backup paths for guarateeig the recovery time tha SSP We fially evaluate the performace of Blockig Probability (BP) that is defied as the rate of the total coectio requests blocked by ETC costraits to the total coectio requests arrived o the etwork I Fig 5, we ca see that the BP of QHR is sigificatly improved compared to SSP, ad the improvemet ratios are up to 53% ad 44% i Natioal etwork ad ARPANET, respectively The reaso for this is that QHR has much faster computatio time tha SSP ad the cosequece is that more coectio requests ca be established withi ETC Therefore, QHR has lower blockig probability tha SSP 5 Coclusio This paper has ivestigated the problem of survivable routig i WDM optical etwork ad proposed a ew algorithm called Quick Heuristic Routig (QHR) to tolerate the sigle-lik failure Compared to previous algorithm, QHR ca yield sigificat improvemets i computatio time ad blockig probability

6 1336 L Guo / Computer Commuicatios 30 (2007) Ackowledgmet The authors thak reviewers for valuable commets Refereces [1] G Maier, A Pattavia, SD Patre, et al, Optical etwork survivability: protectio techiques i WDM layer, Photo Netw Commu 4 (2002) [2] P Ho, H Mouftah, Shared protectio i WDM mesh etworks, IEEE Commu Mag 42 (2004) [3] S Ramamurthy, L Sahasrabuddhe, B Mukherjee, Survivable WDM mesh etworks, J Lightwave Techol 21 (2003) 70 3 [4] P Ho, J Tapolcai, T Cikler, Segmet shared protectio i mesh commuicatios etworks with badwidth guarateed tuels, IEEE/ ACM Tras Netw 12 (2004) [5] D Xu, Y Xiog, C Qiao, Novel algorithms for shared segmet protectio, IEEE J Sel Areas Commu 21 (2003) [6] L Guo, L Li, H Yu, J Cao, Dyamic survivable routig heuristic for shared protected WDM optical etworks, IEEE Commu Lett 10 (2006) [7] C Ou, Hui Zag, N Sighal, et al, Sub-path protectio for scalability ad fast recovery i optical WDM mesh etworks, IEEE J Sel Areas Commu 22 (2004) [] J Cao, L Guo, H Yu, L Li, A ovel hop costraied sub-path protectio routig algorithm i WDM etworks, Opt Commu 260 (2006) Lei Guo was bor i Sichua, Chia, i 190 He received the PhD degree i commuicatio ad iformatio systems from School of Commuicatio ad Iformatio Egieerig, Uiversity of Electroic Sciece ad Techology of Chia, Chegdu, Chia, i 2006 He is curretly a Associate Professor i College of Iformatio Sciece ad Egieerig, Northeaster Uiversity, Sheyag, Chia His research iterests iclude survivability ad GMPLS/WDM etwork techology Dr Guo was the recipiet of the Best Paper Award from the Iteratioal Coferece o Commuicatios, Circuits ad Systems (ICCCAS 04) Dr Lei Guo is a member of IEE ad a member of OSA

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal Advaced Sciece ad Techology Letters, pp.31-35 http://dx.doi.org/10.14257/astl.2014.78.06 Study o the applicatio of the software phase-locked loop i trackig ad filterig of pulse sigal Sog Wei Xia 1 (College

More information

Capacity of Wireless Networks with Heterogeneous Traffic

Capacity of Wireless Networks with Heterogeneous Traffic Capacity of Wireless Networks with Heterogeeous Traffic Migyue Ji, Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer Egieerig Uiversity of Califoria, Sata

More information

Characterizing End-to-End Packet Delay and Loss in the Internet

Characterizing End-to-End Packet Delay and Loss in the Internet Characterizig Ed-to-Ed Packet Delay ad Loss i the Iteret Jea-Chrysostome Bolot Xiyu Sog Preseted by Swaroop Sigh Layout Itroductio Data Collectio Data Aalysis Strategy Aalysis of packet delay Aalysis of

More information

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length Joural o Satisfiability, Boolea Modelig ad Computatio 1 2005) 49-60 A Faster Clause-Shorteig Algorithm for SAT with No Restrictio o Clause Legth Evgey Datsi Alexader Wolpert Departmet of Computer Sciece

More information

Clustering Algorithm Analysis of Web Users with Dissimilarity and SOM Neural Networks

Clustering Algorithm Analysis of Web Users with Dissimilarity and SOM Neural Networks JONAL OF SOFTWARE, VOL. 7, NO., NOVEMBER 533 Clusterig Algorithm Aalysis of Web Users with Dissimilarity ad SOM Neal Networks Xiao Qiag School of Ecoomics ad maagemet, Lazhou Jiaotog Uiversity, Lazhou;

More information

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu Multi-server Optimal Badwidth Moitorig for QoS based Multimedia Delivery Aup Basu, Iree Cheg ad Yizhe Yu Departmet of Computig Sciece U. of Alberta Architecture Applicatio Layer Request receptio -coectio

More information

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

June 3, 1999. Voice over IP

June 3, 1999. Voice over IP Jue 3, 1999 Voice over IP This applicatio ote discusses the Hypercom solutio for providig ed-to-ed Iteret protocol (IP) coectivity i a ew or existig Hypercom Hybrid Trasport Mechaism (HTM) etwork, reducig

More information

C.Yaashuwanth Department of Electrical and Electronics Engineering, Anna University Chennai, Chennai 600 025, India..

C.Yaashuwanth Department of Electrical and Electronics Engineering, Anna University Chennai, Chennai 600 025, India.. (IJCSIS) Iteratioal Joural of Computer Sciece ad Iformatio Security, A New Schedulig Algorithms for Real Time Tasks C.Yaashuwath Departmet of Electrical ad Electroics Egieerig, Aa Uiversity Cheai, Cheai

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

On the Capacity of Hybrid Wireless Networks

On the Capacity of Hybrid Wireless Networks O the Capacity of Hybrid ireless Networks Beyua Liu,ZheLiu +,DoTowsley Departmet of Computer Sciece Uiversity of Massachusetts Amherst, MA 0002 + IBM T.J. atso Research Ceter P.O. Box 704 Yorktow Heights,

More information

Section 11.3: The Integral Test

Section 11.3: The Integral Test Sectio.3: The Itegral Test Most of the series we have looked at have either diverged or have coverged ad we have bee able to fid what they coverge to. I geeral however, the problem is much more difficult

More information

STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA. Maya Maria, Universitas Terbuka, Indonesia

STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA. Maya Maria, Universitas Terbuka, Indonesia STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA Maya Maria, Uiversitas Terbuka, Idoesia Co-author: Amiuddi Zuhairi, Uiversitas Terbuka, Idoesia Kuria Edah

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 2, FEBRUARY 2009 117

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 2, FEBRUARY 2009 117 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 27, NO. 2, FEBRUARY 2009 7 Capacity ad Delay of Hybrid ireless Broadbad Access Networks Pa Li, Chi Zhag, Studet Member, IEEE, ad Yuguag Fag, Fellow,

More information

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis

Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis Ruig Time ( 3.) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

Asymptotic Growth of Functions

Asymptotic Growth of Functions CMPS Itroductio to Aalysis of Algorithms Fall 3 Asymptotic Growth of Fuctios We itroduce several types of asymptotic otatio which are used to compare the performace ad efficiecy of algorithms As we ll

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

Chatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand ocpky@hotmail.com

Chatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand ocpky@hotmail.com SOLVING THE OIL DELIVERY TRUCKS ROUTING PROBLEM WITH MODIFY MULTI-TRAVELING SALESMAN PROBLEM APPROACH CASE STUDY: THE SME'S OIL LOGISTIC COMPANY IN BANGKOK THAILAND Chatpu Khamyat Departmet of Idustrial

More information

Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval

Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval 1 Optimal Adaptive Badwidth Moitorig for QoS Based Retrieval Yizhe Yu, Iree Cheg ad Aup Basu (Seior Member) Departmet of Computig Sciece Uiversity of Alberta Edmoto, AB, T6G E8, CAADA {yizhe, aup, li}@cs.ualberta.ca

More information

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics

More information

Performance Evaluation of the MSMPS Algorithm under Different Distribution Traffic

Performance Evaluation of the MSMPS Algorithm under Different Distribution Traffic Paper Performace Evaluatio of the MSMPS Algorithm uder Differet Distributio Traffic Grzegorz Dailewicz ad Marci Dziuba Faculty of Electroics ad Telecommuicatios, Poza Uiversity of Techology, Poza, Polad

More information

Dynamic House Allocation

Dynamic House Allocation Dyamic House Allocatio Sujit Gujar 1 ad James Zou 2 ad David C. Parkes 3 Abstract. We study a dyamic variat o the house allocatio problem. Each aget ows a distict object (a house) ad is able to trade its

More information

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical

More information

Domain 1 Components of the Cisco Unified Communications Architecture

Domain 1 Components of the Cisco Unified Communications Architecture Maual CCNA Domai 1 Compoets of the Cisco Uified Commuicatios Architecture Uified Commuicatios (UC) Eviromet Cisco has itroduced what they call the Uified Commuicatios Eviromet which is used to separate

More information

Reliability Analysis in HPC clusters

Reliability Analysis in HPC clusters Reliability Aalysis i HPC clusters Narasimha Raju, Gottumukkala, Yuda Liu, Chokchai Box Leagsuksu 1, Raja Nassar, Stephe Scott 2 College of Egieerig & Sciece, Louisiaa ech Uiversity Oak Ridge Natioal Lab

More information

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please

More information

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat

More information

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology

More information

How To Solve The Homewor Problem Beautifully

How To Solve The Homewor Problem Beautifully Egieerig 33 eautiful Homewor et 3 of 7 Kuszmar roblem.5.5 large departmet store sells sport shirts i three sizes small, medium, ad large, three patters plaid, prit, ad stripe, ad two sleeve legths log

More information

Lecture 2: Karger s Min Cut Algorithm

Lecture 2: Karger s Min Cut Algorithm priceto uiv. F 3 cos 5: Advaced Algorithm Desig Lecture : Karger s Mi Cut Algorithm Lecturer: Sajeev Arora Scribe:Sajeev Today s topic is simple but gorgeous: Karger s mi cut algorithm ad its extesio.

More information

Ekkehart Schlicht: Economic Surplus and Derived Demand

Ekkehart Schlicht: Economic Surplus and Derived Demand Ekkehart Schlicht: Ecoomic Surplus ad Derived Demad Muich Discussio Paper No. 2006-17 Departmet of Ecoomics Uiversity of Muich Volkswirtschaftliche Fakultät Ludwig-Maximilias-Uiversität Müche Olie at http://epub.ub.ui-mueche.de/940/

More information

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System

Evaluation of Different Fitness Functions for the Evolutionary Testing of an Autonomous Parking System Evaluatio of Differet Fitess Fuctios for the Evolutioary Testig of a Autoomous Parkig System Joachim Wegeer 1, Oliver Bühler 2 1 DaimlerChrysler AG, Research ad Techology, Alt-Moabit 96 a, D-1559 Berli,

More information

On Formula to Compute Primes. and the n th Prime

On Formula to Compute Primes. and the n th Prime Applied Mathematical cieces, Vol., 0, o., 35-35 O Formula to Compute Primes ad the th Prime Issam Kaddoura Lebaese Iteratioal Uiversity Faculty of Arts ad cieces, Lebao issam.kaddoura@liu.edu.lb amih Abdul-Nabi

More information

Research Article Allocating Freight Empty Cars in Railway Networks with Dynamic Demands

Research Article Allocating Freight Empty Cars in Railway Networks with Dynamic Demands Discrete Dyamics i Nature ad Society, Article ID 349341, 12 pages http://dx.doi.org/10.1155/2014/349341 Research Article Allocatig Freight Empty Cars i Railway Networks with Dyamic Demads Ce Zhao, Lixig

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

Lesson 15 ANOVA (analysis of variance)

Lesson 15 ANOVA (analysis of variance) Outlie Variability -betwee group variability -withi group variability -total variability -F-ratio Computatio -sums of squares (betwee/withi/total -degrees of freedom (betwee/withi/total -mea square (betwee/withi

More information

Data Analysis and Statistical Behaviors of Stock Market Fluctuations

Data Analysis and Statistical Behaviors of Stock Market Fluctuations 44 JOURNAL OF COMPUTERS, VOL. 3, NO. 0, OCTOBER 2008 Data Aalysis ad Statistical Behaviors of Stock Market Fluctuatios Ju Wag Departmet of Mathematics, Beijig Jiaotog Uiversity, Beijig 00044, Chia Email:

More information

INVESTMENT PERFORMANCE COUNCIL (IPC)

INVESTMENT PERFORMANCE COUNCIL (IPC) INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks

More information

Chapter 7 Methods of Finding Estimators

Chapter 7 Methods of Finding Estimators Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of

More information

BANDWIDTH RESERVATION ALGORITHM FOR WIRELESS CELLULAR NETWORKS

BANDWIDTH RESERVATION ALGORITHM FOR WIRELESS CELLULAR NETWORKS Joural of Egieerig Scieces, Assiut Uiversity, Vol. 35, No., pp.3-43, Jauary 7 BANDWIDTH RESERVATION ALGORITHM FOR WIRELESS CELLULAR NETWORKS I. I. Ibrahim ; A. S. Ali Faculty of Egieerig, Helwa Uiversity,

More information

Department of Computer Science, University of Otago

Department of Computer Science, University of Otago Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly

More information

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA , pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of

More information

Unicenter TCPaccess FTP Server

Unicenter TCPaccess FTP Server Uiceter TCPaccess FTP Server Release Summary r6.1 SP2 K02213-2E This documetatio ad related computer software program (hereiafter referred to as the Documetatio ) is for the ed user s iformatioal purposes

More information

Iran. J. Chem. Chem. Eng. Vol. 26, No.1, 2007. Sensitivity Analysis of Water Flooding Optimization by Dynamic Optimization

Iran. J. Chem. Chem. Eng. Vol. 26, No.1, 2007. Sensitivity Analysis of Water Flooding Optimization by Dynamic Optimization Ira. J. Chem. Chem. Eg. Vol. 6, No., 007 Sesitivity Aalysis of Water Floodig Optimizatio by Dyamic Optimizatio Gharesheiklou, Ali Asghar* + ; Mousavi-Dehghai, Sayed Ali Research Istitute of Petroleum Idustry

More information

vskyconf: Cloud-assisted Multi-party Mobile Video Conferencing

vskyconf: Cloud-assisted Multi-party Mobile Video Conferencing vskycof: Cloud-assisted Multi-party Mobile Video Coferecig ABSTRACT Yu Wu Dept. of Computer Sciece The Uiversity of Hog Kog ywu@cs.hku.hk Bo Li Dept. of Computer Sciece ad Egieerig, Hog Kog Uiversity of

More information

The Power of Free Branching in a General Model of Backtracking and Dynamic Programming Algorithms

The Power of Free Branching in a General Model of Backtracking and Dynamic Programming Algorithms The Power of Free Brachig i a Geeral Model of Backtrackig ad Dyamic Programmig Algorithms SASHKA DAVIS IDA/Ceter for Computig Scieces Bowie, MD sashka.davis@gmail.com RUSSELL IMPAGLIAZZO Dept. of Computer

More information

Nr. 2. Interpolation of Discount Factors. Heinz Cremers Willi Schwarz. Mai 1996

Nr. 2. Interpolation of Discount Factors. Heinz Cremers Willi Schwarz. Mai 1996 Nr 2 Iterpolatio of Discout Factors Heiz Cremers Willi Schwarz Mai 1996 Autore: Herausgeber: Prof Dr Heiz Cremers Quatitative Methode ud Spezielle Bakbetriebslehre Hochschule für Bakwirtschaft Dr Willi

More information

Estimating Probability Distributions by Observing Betting Practices

Estimating Probability Distributions by Observing Betting Practices 5th Iteratioal Symposium o Imprecise Probability: Theories ad Applicatios, Prague, Czech Republic, 007 Estimatig Probability Distributios by Observig Bettig Practices Dr C Lych Natioal Uiversity of Irelad,

More information

Convention Paper 6764

Convention Paper 6764 Audio Egieerig Society Covetio Paper 6764 Preseted at the 10th Covetio 006 May 0 3 Paris, Frace This covetio paper has bee reproduced from the author's advace mauscript, without editig, correctios, or

More information

Performance Analysis over Software Router vs. Hardware Router: A Practical Approach. Edward Guillen, Ana María Sossa and Edith Paola Estupiñán

Performance Analysis over Software Router vs. Hardware Router: A Practical Approach. Edward Guillen, Ana María Sossa and Edith Paola Estupiñán Proceedigs of the World Cogress o Egieerig ad Computer Sciece 0 Vol II WCECS 0, October 4-6, 0, Sa Fracisco, USA Performace Aalysis over Software Router vs. Hardware Router: A Practical Approach Edward

More information

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL.

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL. Auities Uder Radom Rates of Iterest II By Abraham Zas Techio I.I.T. Haifa ISRAEL ad Haifa Uiversity Haifa ISRAEL Departmet of Mathematics, Techio - Israel Istitute of Techology, 3000, Haifa, Israel I memory

More information

Performance and Cost-effectiveness Analyses for Cloud Services Based on Rejected and Impatient Users

Performance and Cost-effectiveness Analyses for Cloud Services Based on Rejected and Impatient Users IEEE TRANSACTIONS ON SERVICES COMPUTING, TSC-2014-06-0107.R1 Performace ad Cost-effectiveess Aalyses for Cloud Services Based o Rejected ad Impatiet Users Yi-Ju Chiag 1, Studet Member, IEEE, Ye-Chieh Ouyag

More information

Locating Performance Monitoring Mobile Agents in Scalable Active Networks

Locating Performance Monitoring Mobile Agents in Scalable Active Networks Locatig Performace Moitorig Mobile Agets i Scalable Active Networks Amir Hossei Hadad, Mehdi Dehgha, ad Hossei Pedram Amirkabir Uiversity, Computer Sciece Faculty, Tehra, Ira a_haddad@itrc.ac.ir, {dehgha,

More information

DDoS attacks defence strategies based on nonparametric CUSUM algorithm

DDoS attacks defence strategies based on nonparametric CUSUM algorithm Abstract DDoS attacks defece strategies based o oparametric CUSUM algorithm Chaghog Ya 1*, Qi Dog 2, Hog Wag 3 1 School of Iformatio Egieerig, Yacheg Istitute of Techology, No.9 XiWag Aveue Road, Yacheg,

More information

Business Rules-Driven SOA. A Framework for Multi-Tenant Cloud Computing

Business Rules-Driven SOA. A Framework for Multi-Tenant Cloud Computing Lect. Phd. Liviu Gabriel CRETU / SPRERS evet Traiig o software services, Timisoara, Romaia, 6-10 dec 2010 www.feaa.uaic.ro Busiess Rules-Drive SOA. A Framework for Multi-Teat Cloud Computig Lect. Ph.D.

More information

Chapter 5: Inner Product Spaces

Chapter 5: Inner Product Spaces Chapter 5: Ier Product Spaces Chapter 5: Ier Product Spaces SECION A Itroductio to Ier Product Spaces By the ed of this sectio you will be able to uderstad what is meat by a ier product space give examples

More information

Induced Cooperative Multi-user Diversity Relaying for Multi-hop Cellular Networks

Induced Cooperative Multi-user Diversity Relaying for Multi-hop Cellular Networks Iduced Cooperative Multi-user Diversity Relayig for Multi-hop Cellular Networks Keiva Navaie ad Halim Yaikomeroglu Broadbad Commuicatios ad Wireless Systems (BCWS) Cetre Departmet of Systems ad Computer

More information

5 Interconnection Networks

5 Interconnection Networks 5 Itercoectio Networks 5. INTRODUCTION Networkig strategy was origially employed i the 950's by the telephoe idustry as a meas of reducig the time required for a call to go through. Similarly, the computer

More information

Intelligent Sensor Placement for Hot Server Detection in Data Centers - Supplementary File

Intelligent Sensor Placement for Hot Server Detection in Data Centers - Supplementary File Itelliget Sesor Placemet for Hot Server Detectio i Data Ceters - Supplemetary File Xiaodog Wag, Xiaorui Wag, Guoliag Xig, Jizhu Che, Cheg-Xia Li ad Yixi Che The Ohio State Uiversity, USA Michiga State

More information

UC Berkeley Department of Electrical Engineering and Computer Science. EE 126: Probablity and Random Processes. Solutions 9 Spring 2006

UC Berkeley Department of Electrical Engineering and Computer Science. EE 126: Probablity and Random Processes. Solutions 9 Spring 2006 Exam format UC Bereley Departmet of Electrical Egieerig ad Computer Sciece EE 6: Probablity ad Radom Processes Solutios 9 Sprig 006 The secod midterm will be held o Wedesday May 7; CHECK the fial exam

More information

Telecomunicazione. A Priority-Aware Protection Technique for QoS Enabled WDM Networks

Telecomunicazione. A Priority-Aware Protection Technique for QoS Enabled WDM Networks Uiversità di Bergamo Facoltà di Igegeria dell Iformazioe e etodi atematici La Protezioe elle Reti di Telecomuicazioe A Priority-Aware Protectio Techique for QoS Eabled WD etworks Fabio artigo Sommario

More information

Research Article Sign Data Derivative Recovery

Research Article Sign Data Derivative Recovery Iteratioal Scholarly Research Network ISRN Applied Mathematics Volume 0, Article ID 63070, 7 pages doi:0.540/0/63070 Research Article Sig Data Derivative Recovery L. M. Housto, G. A. Glass, ad A. D. Dymikov

More information

Integer Factorization Algorithms

Integer Factorization Algorithms Iteger Factorizatio Algorithms Coelly Bares Departmet of Physics, Orego State Uiversity December 7, 004 This documet has bee placed i the public domai. Cotets I. Itroductio 3 1. Termiology 3. Fudametal

More information

Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here).

Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here). BEGINNING ALGEBRA Roots ad Radicals (revised summer, 00 Olso) Packet to Supplemet the Curret Textbook - Part Review of Square Roots & Irratioals (This portio ca be ay time before Part ad should mostly

More information

The Stable Marriage Problem

The Stable Marriage Problem The Stable Marriage Problem William Hut Lae Departmet of Computer Sciece ad Electrical Egieerig, West Virgiia Uiversity, Morgatow, WV William.Hut@mail.wvu.edu 1 Itroductio Imagie you are a matchmaker,

More information

An Optimization Approach for Utilizing Cloud Services for Mobile Devices in Cloud Environment

An Optimization Approach for Utilizing Cloud Services for Mobile Devices in Cloud Environment INFORMATICA, 2015, Vol. 26, No. 1, 89 110 89 2015 Vilius Uiversity DOI: http://dx.doi.org/10.15388/iformatica.2015.40 A Optimizatio Approach for Utilizig Cloud Services for Mobile Devices i Cloud Eviromet

More information

1. C. The formula for the confidence interval for a population mean is: x t, which was

1. C. The formula for the confidence interval for a population mean is: x t, which was s 1. C. The formula for the cofidece iterval for a populatio mea is: x t, which was based o the sample Mea. So, x is guarateed to be i the iterval you form.. D. Use the rule : p-value

More information

TO: Users of the ACTEX Review Seminar on DVD for SOA Exam FM/CAS Exam 2

TO: Users of the ACTEX Review Seminar on DVD for SOA Exam FM/CAS Exam 2 TO: Users of the ACTEX Review Semiar o DVD for SOA Exam FM/CAS Exam FROM: Richard L. (Dick) Lodo, FSA Dear Studets, Thak you for purchasig the DVD recordig of the ACTEX Review Semiar for SOA Exam FM (CAS

More information

NEW HIGH PERFORMANCE COMPUTATIONAL METHODS FOR MORTGAGES AND ANNUITIES. Yuri Shestopaloff,

NEW HIGH PERFORMANCE COMPUTATIONAL METHODS FOR MORTGAGES AND ANNUITIES. Yuri Shestopaloff, NEW HIGH PERFORMNCE COMPUTTIONL METHODS FOR MORTGGES ND NNUITIES Yuri Shestopaloff, Geerally, mortgage ad auity equatios do ot have aalytical solutios for ukow iterest rate, which has to be foud usig umerical

More information

Management of Wireless Sensor Networks using TCP/IP

Management of Wireless Sensor Networks using TCP/IP Maagemet of Wireless Sesor etworks usig TCP/IP Markus Awader, Gerald Wagekecht, ad Torste Brau Istitute of Computer Sciece ad Applied Mathematics Uiversity of Ber, Switzerlad Email: {awader, wage, brau}@iam.uibe.ch

More information

Systems Design Project: Indoor Location of Wireless Devices

Systems Design Project: Indoor Location of Wireless Devices Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: bcm1@cec.wustl.edu Supervised

More information

On Wiretap Networks II

On Wiretap Networks II O Wiretap Networks II alim Y. El Rouayheb ECE Departmet Texas A&M Uiversity College tatio, TX 77843 salim@ece.tamu.edu Emia oljai Math. cieces Ceter Bell Labs, Alcatel-Lucet Murray ill, NJ 07974 emia@alcatel-lucet.com

More information

Major Coefficients Recovery: a Compressed Data Gathering Scheme for Wireless Sensor Network

Major Coefficients Recovery: a Compressed Data Gathering Scheme for Wireless Sensor Network This full text paper was peer reviewed at the directio of IEEE Commuicatios Society subject matter experts for publicatio i the IEEE Globecom proceedigs. Major Coefficiets Recovery: a Compressed Data Gatherig

More information

Application and research of fuzzy clustering analysis algorithm under micro-lecture English teaching mode

Application and research of fuzzy clustering analysis algorithm under micro-lecture English teaching mode SHS Web of Cofereces 25, shscof/20162501018 Applicatio ad research of fuzzy clusterig aalysis algorithm uder micro-lecture Eglish teachig mode Yig Shi, Wei Dog, Chuyi Lou & Ya Dig Qihuagdao Istitute of

More information

A Cross-Layer Cross-Overlay Architecture for Proactive Adaptive Processing in Mesh Networks

A Cross-Layer Cross-Overlay Architecture for Proactive Adaptive Processing in Mesh Networks 1 A Cross-Layer Cross- Architecture for Proactive Adaptive Processig i Mesh Networks Dilip Krishaswamy, Hsie-Po Shiag, Joh Vicete, Vidya Govida, W. Steve Coer, Sajay Rugta, Wiso Cha, Kai Miao Itel Corporatio,

More information

CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION

CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION www.arpapress.com/volumes/vol8issue2/ijrras_8_2_04.pdf CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION Elsayed A. E. Habib Departmet of Statistics ad Mathematics, Faculty of Commerce, Beha

More information

Heterogeneous Vehicle Routing Problem with profits Dynamic solving by Clustering Genetic Algorithm

Heterogeneous Vehicle Routing Problem with profits Dynamic solving by Clustering Genetic Algorithm IJCSI Iteratioal Joural of Computer Sciece Issues, Vol. 10, Issue 4, No 1, July 2013 ISSN (Prit): 1694-0814 ISSN (Olie): 1694-0784 www.ijcsi.org 247 Heterogeeous Vehicle Routig Problem with profits Dyamic

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

! encor e networks TM

! encor e networks TM ! ecor e etworks TM Copyright 2003 Ecore Networks, Ic. All rights reserved. SigalPath 201 (SP201 ) Istallatio Guide Versio C, July 2004 Part Number 15469.1000 SigalPath Software Versio 1100 This Istallatio

More information

LECTURE 13: Cross-validation

LECTURE 13: Cross-validation LECTURE 3: Cross-validatio Resampli methods Cross Validatio Bootstrap Bias ad variace estimatio with the Bootstrap Three-way data partitioi Itroductio to Patter Aalysis Ricardo Gutierrez-Osua Texas A&M

More information

Generalized Scheme For Fractal Based Digital Signature (GFDS)

Generalized Scheme For Fractal Based Digital Signature (GFDS) IJCSS Iteratioal Joural of Computer Sciece ad etwork Security, VOL.7 o.7, July 2007 99 Geeralized Scheme For Fractal Based Digital Sigature (GFDS) Mohammad Ahmad Alia ad Azma Bi Samsudi, School of Computer

More information

Valuing Firms in Distress

Valuing Firms in Distress Valuig Firms i Distress Aswath Damodara http://www.damodara.com Aswath Damodara 1 The Goig Cocer Assumptio Traditioal valuatio techiques are built o the assumptio of a goig cocer, I.e., a firm that has

More information

15.075 Exam 3. Instructor: Cynthia Rudin TA: Dimitrios Bisias. November 22, 2011

15.075 Exam 3. Instructor: Cynthia Rudin TA: Dimitrios Bisias. November 22, 2011 15.075 Exam 3 Istructor: Cythia Rudi TA: Dimitrios Bisias November 22, 2011 Gradig is based o demostratio of coceptual uderstadig, so you eed to show all of your work. Problem 1 A compay makes high-defiitio

More information

How to read A Mutual Fund shareholder report

How to read A Mutual Fund shareholder report Ivestor BulletI How to read A Mutual Fud shareholder report The SEC s Office of Ivestor Educatio ad Advocacy is issuig this Ivestor Bulleti to educate idividual ivestors about mutual fud shareholder reports.

More information

Sequences and Series

Sequences and Series CHAPTER 9 Sequeces ad Series 9.. Covergece: Defiitio ad Examples Sequeces The purpose of this chapter is to itroduce a particular way of geeratig algorithms for fidig the values of fuctios defied by their

More information

Domain 1 - Describe Cisco VoIP Implementations

Domain 1 - Describe Cisco VoIP Implementations Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.

More information

SPC for Software Reliability: Imperfect Software Debugging Model

SPC for Software Reliability: Imperfect Software Debugging Model IJCSI Iteratioal Joural of Computer Sciece Issues, Vol. 8, Issue 3, o., May 0 ISS (Olie: 694-084 www.ijcsi.org 9 SPC for Software Reliability: Imperfect Software Debuggig Model Dr. Satya Prasad Ravi,.Supriya

More information

LOAD BALANCING IN PUBLIC CLOUD COMBINING THE CONCEPTS OF DATA MINING AND NETWORKING

LOAD BALANCING IN PUBLIC CLOUD COMBINING THE CONCEPTS OF DATA MINING AND NETWORKING LOAD BALACIG I PUBLIC CLOUD COMBIIG THE COCEPTS OF DATA MIIG AD ETWORKIG Priyaka R M. Tech Studet, Dept. of Computer Sciece ad Egieerig, AIET, Karataka, Idia Abstract Load balacig i the cloud computig

More information

Research Article Rate-Based Active Queue Management for TCP Flows over Wired and Wireless Networks

Research Article Rate-Based Active Queue Management for TCP Flows over Wired and Wireless Networks Hidawi Publishig Corporatio EURASIP Joural o Wireless Commuicatios ad Networkig Volume 2007, Article ID 54038, 8 pages doi:10.1155/2007/54038 Research Article Rate-Based Active Queue Maagemet for TCP Flows

More information

CS100: Introduction to Computer Science

CS100: Introduction to Computer Science Review: History of Computers CS100: Itroductio to Computer Sciece Maiframes Miicomputers Lecture 2: Data Storage -- Bits, their storage ad mai memory Persoal Computers & Workstatios Review: The Role of

More information

International Journal on Emerging Technologies 1(2): 48-56(2010) ISSN : 0975-8364

International Journal on Emerging Technologies 1(2): 48-56(2010) ISSN : 0975-8364 e t Iteratioal Joural o Emergig Techologies (): 48-56(00) ISSN : 0975-864 Dyamic load balacig i distributed ad high performace parallel eterprise computig by embeddig MPI ad ope MP Sadip S. Chauha, Sadip

More information