HIDDEN HOPS AWARE LOAD BALANCING BASED ON GREEDY APPROACH

Size: px
Start display at page:

Download "HIDDEN HOPS AWARE LOAD BALANCING BASED ON GREEDY APPROACH"

Transcription

1 Jora of Theoretca ad Apped Iformato Techoogy 10 th Febrary Vo. 48 o JATIT & LLS. A rght reered. ISS: E-ISS: HIDDE HOPS AWARE LOAD BALACIG BASED O GREEDY APPROACH 1 BI-BI HUAG, 2 ROG-HEG LI, 3 HOG-XIA ZHAG, 4 HUA ZOU, 5 FAG-CHU YAG State Key Laboratory of etworkg ad Swtchg Techoogy, Beg Uerty of Pot ad Teecommcato, Beg Cha Ema: { hagbb 1, rh 2, zoha 4, fcyag 5 }@bpt.ed.c, [email protected] ABSTRACT Vrta etwork mappg oe of the ma probem etwork rtazato. At preet, rta etworkg mappg am at mma reorce compto at btrate etwork, bt gore the reorce demaded by the hdde hop, makg botteeck de to the reorce hortage at the hdde hop. Th paper am at the mtaeo oadg baace of the btrate ode ad the btrate k, mathematcay formate the rta etworkg mappg probem cotraed by hop, ad oe t by g greedy agorthm. Or expermet how that th agorthm emate reorce botteeck effcety, prode a more baaced btrate etwork for the reqet of the coeqeta rta etwork reqet, th mprog the cotrctg cce rate of rta etwork, the aaabty of etwork reorce ad the proft of the fratrctre proder. Keyword: Vrta etwork appg, Hdde Hop, Load Baacg, Greedy Agorthm. 1. ITRODUCTIO Vrtazato of etwork reorce ha bee detfed a a key techoogy for Ftre Iteret reearch [1] ad actey ed crret reearch tetbed [2][3]. By rtazg both ode ad k reorce of a btrate etwork, mtpe rta etwork topooge wth wdey aryg charactertc ca be created ad cohoted o the ame phyca hardware. It make cod proder to ga ecoomca reee from dertzed phyca reorce [4]. Howeer, appyg rtazato of etwork reorce ead to the probem of mappg rta reorce to phyca reorce, kow a rta etwork mappg. The o-caed rta etwork mappg ca be ewed a the agmet of the reorce from a rta etwork to the compoet of a phyca etwork. Extg reearche [5-12] cafy t a a cotrat optmzato probem wth the obecte of mmzg mappg cot. Bt they egect the reorce compto of a hdde hop o the path, whch ret botteeck becae of ffcet hdde hop reorce. Becae mappg a rta k to a path the Sbtrate oboy e reorce of the btrate k o the path. Howeer, there are ao phyca ode o the path that w be traered by the rta k. Thee are caed Hdde Hop here. The rta k w ao come reorce of a Hdde Hop o the path. Frthermore, eera rta k ca e the ame phyca k. The botteeck fece the performace of the whoe btrate etwork ad the reqet cce rate of the coeqeta rta etwork. I preo work [13], the mportat ad reatc cocept of hdde hop trodced rta etwork mappg. The reqred demad of the hdde hop hep to carry ot a more reatc rta etwork mappg, becae more rta etwork ca be mapped takg to accot the CPU demad of hdde hop. Howeer, th work codere the offe ero of the agorthm, ad the rta ode mappg ot codered. I [14], the obecte to baace the oad of btrate k. Th paper formate t to be a tcommodty-fow probem ad propoe a agorthm to oe the rta etwork mappg probem baed o optmzato theory. Bt th paper egect the CPU reorce that mt be aged to a termedate ode ad doe t foc o the ode oad baacg. I [15], baaced k oad ad baaced ode oad rta etwork cotrcto agorthm are ge, repectey. Baed o thee, two agorthm 582

2 Jora of Theoretca ad Apped Iformato Techoogy 10 th Febrary Vo. 48 o JATIT & LLS. A rght reered. ISS: E-ISS: Baaced Adapte rta etwork Cotrcto Agorthm (BACA) propoed. Bt, th paper, there are two e a foow: frty, the rta ode mappg the rta etwork reqet determed adace, whch mpfe the rta etwork mappg probem to the rta k mappg probem; Secody, th paper doe ot coder the CPU reorce that mt be aged to a termedate ode o the path that w be traered by the rta k. Addreg ch a probem oe cearo, we coder the CPU reorce that mt be aged to a termedate ode. To remoe effcety the reorce botteeck de to the ffcet hdde hop reorce, we am at the mtaeo oadg baace of the btrate ode ad the btrate k, formate the rta etworkg mappg probem cotraed by hop, ad propoe a Load baacg Greedy (LB-Greedy) agorthm. oreoer, we codct a merca comparo betwee or agorthm ad BACA. The mato expermet how that there are effcece abot LB-Greedy a foow: frt, after gettg rd of the reorce expee of a termedate ode, t abe to remoe effcety the reorce botteeck wth the goa of baaced k oad ad baaced ode oad. It w prode a more baaced btrate etwork for the coeqeta rta etwork reqet, thereby mprog the cotrctg cce rate of rta etwork, the aaabty of etwork reorce ad the proft of the fratrctre proder. Secod, mtg the hop cot o the path that w be traered by the rta k w e a e btrate reorce a pobe. So, t ca map a may rta etwork reqet a pobe the mted btrate etwork ad maxmze the proft of fratrctre proder. The ret of th paper orgazed a foow. Foowg that, ecto 2 formaze the rta etwork mappg probem ad preet the performace metrc. I Secto 3, we preet the LB-Greedy agorthm. I ecto 4 we decrbe the mato ettg ad preet mato ret that eaate the propoed agorthm, ad we cocde ad detfyg ftre reearch drecto ecto VIRTUAL ETWORK APPIG AD PERFORACE ETRICS 2.1 Vrta etwork appg ode For coeece, we abtract the rta etwork mappg probem to be the graph theory probem, ad e a weghted drected graph G (, E) to preet the btrate etwork. The whoe CPU reorce of the phyca ode deoted C, ad the aaabe reorce deoted by by ( ) c( ) ( e, ) E deoted by ( ( B e, )) aaabe badwdth deoted by ( (, )). The whoe badwdth of the btrate k, ad the b e. Smary, a weghted drected graph G (, E) preet the rta etwork whch a b-graph of the btrate etwork. The CPU reorce demad of rta ode deoted c, the badwdth demad of rta k by ( ) deoted by ( ( b e, )). appg a rta k to a path the Sbtrate oboy e reorce of the btrate k o the path, bt the rta k w ao come reorce of a Hdde Hop o the path. Here we deote the CPU reorce expee of a termedate ode by m (, ), whch make the rta etwork mappg more reaoabe Reorce compto mode of hdde hop The termedate ode o the btrate path eed to be cofgred ad correcty forward the packet pag the rta k, thereby they w hae a CPU expedtre. Ad how mch CPU reorce w be expeded deped o the badwdth demad ( ( b e, )) of rta k ad charactertc (ke freqecy of ode, etc) of the btrate ode. The, we w formate the CPU reorce demad of a termedate ode a foow: Sppoe Φ Gbp100 BW t, Γ GHz100 CPU t, the packet ze PS byte, CPU cyce whch eeded to forward ch ze packet ω Cyce. The CPU reorce expee of a termedate ode ca be cacated a foow: 9 ( e( )) Φ b, 10 m PS (1) 9 Γ 10 ω Sbect to: 583

3 Jora of Theoretca ad Apped Iformato Techoogy 10 th Febrary Vo. 48 o JATIT & LLS. A rght reered. ISS: E-ISS: ( ) c m m > x c m 1 + e E δ ( ) (,, ) m(, ) ( ( )) ( ( )) (2) mt m t m f R p,,, b e, > 0 (3) ( ) ( ) δ,, m, > c( ) (4) (,, ) δ a bary arabe. It 0 f the btrate ode a termedate ode of the path that w be traered by the rta k ( e, ). It 0 eewhere. p( m, t,, ) preet the btrate path that w be traered by m t e,. Ad the reda the rta k ( ) badwdth of ( m, t,, ) ( ( m, t,, )) p deoted by R p. Cotra et (2) ad (3) cota the CPU capacty for btrate ode ad the badwdth capabty for btrate path p( m, t,, ). They are the m of the CPU ad the badwdth aged to each rta ode ad k, ad t w ot exceed btrate ode or k capacty. Cotra (4) cotra the CPU reorce of a termedate ode of a path that w be traered by a rta k Load formato for btrate ode ad btrate k Accordg to the tattc ad aay, t ca be draw that a more baaced btrate etwork ca mproe the cotrctg cce rate for the coeqeta rta etwork reqet, whch ca creae reorce tzato for btrate etwork. So, drg the mappg proce, t eed to are the baaced etwork oad amog btrate k, ad ao the baaced CPU oad amog btrate ode, whch ca mproe the cotrctg cce rate for the coeqeta rta etwork reqet ad make effcet e of the deryg reorce. The btrate ode act both the work ode performg er tak ad a hdde hop. A hdde hop w hae a CPU expedtre becae t ha to be cofgred ad t w hae to correcty forward the packet pag throgh th rta k. We deote the btrate ode CPU oad a foow: ( ) m m m 1 e, E ( ) ( ) x c( ) + δ,, m, ( ) c ( ) (5) The mea ae amog the btrate ode CPU oad deoted by : ag 1 ( ) ag (6) I the ame way, we deote the etwork oad amog btrate k a foow: ( ) L e ( ) mt m t f b e m t (, ) be (, ) e E ( ) (7) The mea ae for the etwork oad amog btrate k deoted by L ag : (8) L ag e E ( (, )) L e E The tadard deato for the CPU oad amog btrate ode deoted by : ( ( ) ) 2 ag 1 (9) The tadard deato for the etwork oad amog btrate k deoted by L : L (10) e E ( L( e(, )) Lag ) E To aod hot pot ad mproe the coeqeta rta etwork reqet acceptace rato, the obecte of the rta etwork mappg probem to mata baaced tre amog a btrate ode ad btrate k: mm α + βl (11) Where α ad β are ed to adt the weght of k ad ode oad baacg, repectey. 2.2 Vrta etwork appg ode To eaate the tre baacg performace, we may defe three performace metrc a foow: Defto 1: The rta etwork reqet acceptace rato of the btrate etwork ca be defed by 2 584

4 Jora of Theoretca ad Apped Iformato Techoogy 10 th Febrary Vo. 48 o JATIT & LLS. A rght reered. ISS: E-ISS: Rq cce _ rato Rq cce tota (12) Where Rq cce the mber of rta etwork reqet ccefy accepted by the btrate etwork Rq tota the tota mber of rta etwork reqet. Defto 2: The oadg baace degree amog btrate etwork ca be deoted by: D α + βl (13) Defto 3: The aerage of ode oad ad the aerage of k oad ca be deoted, repectey, a foow: 1 µ ode µ k ( ) e E (14) ( (, )) L e E (15) 3. PROPOSAL: LOAD BALACIG GREEDY ALGORITH Sce the rta etwork mappg wth the cotrat ha bee proed to be a P [5]. Ad fdg a optma rta etwork mappg for oadg baace by g mxed teger ear programmg (ILP) comptatoay tractabe. We propoe effcet hertc to oe the probem. LB-Greedy a greedy agorthm wth hertc for mappg the rta etwork reqet to the btrate etwork, whe tryg to baace the oad of the whoe btrate etwork after gettg rd of the reorce expee of a termedate ode. Ge beow the deta of LB-Greedy. Before decrbg the deta of LB-Greedy, the reorce demad of a rta ode ad a rta k w be frty defed. Defto 4: The reorce demad of a rta ode ca be defed a foow: H( ) c ( ) b ( ) L ( ) L Where, for a rta etwork reqet, ( ) the et of a the mapped otgog k of, b ( ) the badwdth demad of the rta k c the CPU demad of whch mapped. ( ). Accordg to the defto aboe, we defe the reorce demad of a rta k (, ) foow: e a ( (, )) ( ) ( ) + ( ) ( ) H e c b c b L ( ) L ( ) LB-Greedy a rta etwork mappg agorthm coordatg ode ad k. The trategy for rta k mappg ee the Agorthm 1: Agorthm 1 LB-Greedy 1: Parameter Itazato: taze the parameter ad ~. ad ~ are the et of mapped k ad mapped k G, repectey. 2: Whe ~ do 3: Chooe the rta k wth the arget H e, ~ reorce demad ( ( )) 4: If both the orce ode Sode ad the detato ode Eode of the rta k are mapped, they w be mapped a foow: 4.1: For Sode, fd the aocated btrate ode wth the arget aaabe reorce H( ) for t. 4.2: Fd a bet of caddate btrate ode for Eode. The caddate btrate ode mt meet wth the codto a foow: a) The btrate ode aocated b) The btrate ode wth the hop cot mt. c) The aaabe reorce of the btrate ode meet wth the cotrat (2). d) There at eat a path whoe badwdth meet wth (3). Ad the cotrat o each hdde hop o the path mt meet wth (4). 4.3: Ag the caddate ode wth mmm mappg cot (ee (11)) to Eode. 5: Ee f ether of Sode ad Eode mapped, the mapped ode w be mapped a foow: 5.1 Fd a bet of caddate btrate ode for the mapped ode wth the hop cot mt of the 585

5 Jora of Theoretca ad Apped Iformato Techoogy 10 th Febrary Vo. 48 o JATIT & LLS. A rght reered. ISS: E-ISS: mapped ode. Ad the caddate btrate ode mt be meet wth the codto a foow: a) The aaabe reorce of the aocated btrate ode meet wth (2). b) There at eat a path whoe badwdth meet wth (3). Ad the cotrat o each hdde hop o the path mt meet wth (4). 5.2 Ag the caddate ode wth mmm mappg cot (ee (11)) to the mapped ode. 6: Ee f both of them are mapped, there at eat a path whoe badwdth mt meet wth (3), ad the cotrat o each hdde hop o the path mt meet wth (4). 7: If t cceed, pt the mapped rta k to, ad remoe t from ~. Or chooe a rta k radomy, remoe th rta k ad the oe to reate to t from to ~. 8: If ~, pt ot the mappg cheme, or go back to PERFORACE EVALUATIO I th ecto, we w tdy the effcecy of or propoa. To achee th, we w frt decrbe the mato eromet, ad the preet or mato ret. The expermet foc prmary o the performace comparo of LB-Greedy wth the BACA [15]. 4.1 Smato Setp A tated [15], we et the btrate etwork topoogy wth 100 ode. The aerage btrate etwork coectty fxed at The CPU ad badwdth reorce of the btrate ode ad k are rea mber formy dtrbted betwee 50 ad 100. We mode the arra of rta etwork reqet by a Poo Proce wth rate 0.05;ad each oe ha a expoetay dtrbted fetme wth a aerage of 400 tme t. Frthermore, we et the rta etwork ze accordg to a dcrete form dtrbto, g the ae ge [2, 10]. The aerage rta etwork coectty fxed at 0.5. The CPU ad badwdth demad of rta ode ad rta k are rea mber formy dtrbted betwee 0 ad 50. A tated [14], we et the hop cot wth [4,8]. The expee of Hdde hop o the path that w be traered by the rta k ee [16], we et a btrate etwork traportg packet ze PS 1500 byte, the btrate ode CPU capabty Γ 2.66 GHz, the btrate ode badwdth capacty Φ 1Gbp, the mber of cyce ed to proce a packet the ode ω Cyce. Accordg to thee parameter ettg, the CPU reorce that mt be aged to a termedate ode o the path that w be traered by the rta k 1.2 tme the badwdth. The rage of the weght coeffcet α ad β or obecte fcto (13) are both [ ], ad they meet wth the cotrat α + β Eaato Ret Or eaato ret qatfy the effcecy of LB-Greedy we propoed. Seera performace metrc for eaato prpoe are ed, cdg the rta etwork reqet acceptace rato defed by Eqato (12), the oad baacg degree defed by Eqato (13), the aerage of ode oad defed by Eqato (14), the aerage of k oad defed by Eqato (15). We mmarze the key oberato from or mato a foow. Fg. 1 how a comparo of the acceptace rato of rta etwork reqet obtaed by the mappg tratege LB-Greedy ad BACA. We ca ee frt of a that both of the two agorthm prodce hgh acceptace rato whch achee to 100%. Or propoa cotety hgher tha BACA whe the mber of rta etwork reqet grow. A mportat factor that BACA prodce arger reda reorce fragmetato o the btrate etwork tha LB- Greedy, whch fece the acceptace rato of comg rta etwork reqet. Fg. 1 The Vrta etwork Reqet Acceptace Rato Comparo. Fg.2 eaate the oad baacg degree of LB- Greedy ad BACA whe the mber of rta etwork reqet creae. The e the ae of oad baacg degree, the more baaced the btrate etwork. So we ca oboy fd the LB-Greedy ca prodce a more baaced btrate etwork tha BACA. The reao that LB-Greedy cheme aocate the reorce to the rta etwork reqet 586

6 Jora of Theoretca ad Apped Iformato Techoogy 10 th Febrary Vo. 48 o JATIT & LLS. A rght reered. ISS: E-ISS: wth mmm mappg cot (ee (11)), whch cotrct a more baaced btrate etwork. Fg. 2 The Loadg Baace Degree Comparo. Fg. 3 The Aerage Of ode Load Comparo. ffcet hdde hop reorce, th paper am at the mtaeo oadg baace of the btrate ode ad the btrate k, formate the rta etworkg mappg probem cotraed by hop. ote that t P-hard ad comptatoay tractabe. I repoe, we propoed a LB-Greedy agorthm. Baed o extee mato, after gettg rd of the reorce expee of a termedate ode, t abe to remoe effcety the reorce botteeck wth the goa of baaced k oad ad baaced ode oad. It w prode a more baaced btrate etwork for the coeqeta rta etwork reqet, thereby mprog the cotrctg cce rate of rta etwork, the aaabty of etwork reorce ad the proft of the fratrctre proder. Frthermore, mtg the hop cot o the path that w be traered by the rta k w e a tte btrate reorce a pobe. So, t ca map a may rta etwork reqet a pobe the mted btrate etwork ad maxmze the proft of fratrctre proder. ACKOWLEDGETS Th work pported by the atoa atra Scece Fd Cha der Grat o. 2009CB320406, the atoa 863 Hgh-tech Proect of Cha der Grat o. 2011AA01A102, Fd for Create Reearch Grop of Cha ( ) ad State Key Lab of etworkg ad Swtchg Techoogy. REFERECES Fg. 4 The Aerage Of Lk Load Comparo. Fg. 3 ad Fg. 4 how that LB-Greedy ca prodce e aerage of ode oad ad k oad tha BACA for the ame rta etwork reqet. To accept a rta etwork reqet, LB-Greedy wth hop cot mt come e btrate reorce tha BACA. Ad ao LB-Greedy cotrct a more baaced btrate etwork wth mmm mappg cot (ee (11)) tha BACA. A thee effort make LB-Greedy to prodce e ode oad ad k oad tha BACA btrate etwork. 5. COCLUSIOS I th paper, we aayze the e of extg reearche, ad coder the CPU reorce that mt be aged to a termedate ode. To remoe effcety the reorce botteeck de to the [1] A. Ber, A. Fcher, ad H. de eer, Vrtaerg m ftre teret, Iformatk- Spektrm, o. 33, o. 2, pp , [2] J. Carapha ad J. Jméez, etwork rtazato: a ew from the bottom, Proceedg of the 1t AC workhop o Vrtazed fratrctre ytem ad archtectre, 2009, pp [3] D. Schwerde, D. Güther, R. Hee, B. Rether, ad P. üer, Germa-ab expermeta facty, Ftre Iteret-FIS 2010, pp. 1 10, [4] A. Lek,. Kem, J. m, S. Ta, ad T. Sadhom, What de the Cod? A archtectra map of the Cod adcape, Proceedg of the 2009 ICSE Workhop o Software Egeerg Chaege of Cod Comptg, 2009, pp

7 Jora of Theoretca ad Apped Iformato Techoogy 10 th Febrary Vo. 48 o JATIT & LLS. A rght reered. ISS: E-ISS: [5]... K. Chowdhry,. R. Rahma, ad R. Botaba, Vrta etwork embeddg wth coordated ode ad k mappg, IFOCO 2009, IEEE, 2009, pp [6]. Zhag, C. W,. Jag, ad Q. Yag, appg mtcat erce-oreted rta etwork wth deay ad deay arato cotrat, GLOBECO 2010, 2010 IEEE Goba Teecommcato Coferece, 2010, pp [7] S. ZHAG ad X. QIU, A oe rta etwork mappg agorthm for cot mmzg, Cyber Jora: Jora of Seected Area Teecommcato (JSAT), [8] H. Y, C. Qao, V. Aad, X. L, H. D, ad G. S, Srabe Vrta Ifratrctre appg a Federated Comptg ad etworkg Sytem der Sge Regoa fare, GLOBECO 2010, 2010 IEEE Goba Teecommcato Coferece, 2010, pp [9] G. S, H. Y, L. L, V. Aad, H. D, ad X. Gao, Effcet agorthm for rabe rta etwork embeddg, Aa Commcato ad Photoc Coferece ad Exhbto, [10] I. Faar,. Ataad, G. Poe, ad H. Zmmerma, VE-AC: Vrta etwork embeddg agorthm baed o at cooy metahertc, Commcato (ICC), 2011 IEEE Iteratoa Coferece o, 2011, pp [11] Y. Zh ad. Ammar, Agorthm for agg btrate etwork reorce to rta etwork compoet, Proc. IEEE IFOCO, 2006, o. 2. [12]. Y, Y. Y, J. Rexford, ad. Chag, Rethkg rta etwork embeddg: btrate pport for path pttg ad mgrato, AC SIGCO Compter Commcato Reew, o. 38, o. 2, pp , [13] J. F. Botero, X. Heebach, A. Fcher, ad H. De eer, Optma mappg of rta etwork wth hdde hop, Teecommcato Sytem, pp. 1 10, [14] JIAG g, WAG Bao-, WU Chmg,KOG Xag-qg, I Xao ad ZHAG. Reearch o etwork Vrtazato ad Vrta etwork appg Agorthm[J]. Acta Eectroca Sca, 2011, 39(6): [15] Q g, Wag Bao-, Wag B-qag ad Zhag Dog. Reearch o Baaced Cotrcto Agorthm of Vrta etwork[j]. Joa of Eectroc & Iformato Techoogy, 2011, 33(6): [16] A. Fcher, J. F. Botero Vega,. De, D. Schoer, X. Heebach Serra, ad H. De eer, ALEVI-A framework to deeop, compare, ad aayze rta etwork embeddg agorthm,

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

Swarm Based Truck-Shovel Dispatching System in Open Pit Mine Operations

Swarm Based Truck-Shovel Dispatching System in Open Pit Mine Operations Swarm Baed Truck-Shovel Dpatchg Sytem Ope Pt Me Operato Yaah Br, W. Scott Dubar ad Alla Hall Departmet of Mg ad Meral Proce Egeerg Uverty of Brth Columba, Vacouver, B.C., Caada Emal: [email protected] Abtract

More information

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira [email protected],

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

Lecture 7. Norms and Condition Numbers

Lecture 7. Norms and Condition Numbers Lecture 7 Norms ad Codto Numbers To dscuss the errors umerca probems vovg vectors, t s usefu to empo orms. Vector Norm O a vector space V, a orm s a fucto from V to the set of o-egatve reas that obes three

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

Credit Risk Evaluation of Online Supply Chain Finance Based on Third-party B2B E-commerce Platform: an Exploratory Research Based on China s Practice

Credit Risk Evaluation of Online Supply Chain Finance Based on Third-party B2B E-commerce Platform: an Exploratory Research Based on China s Practice Iteratoal Joural of u- ad e- Servce, Scece ad Techology Vol.8, No.5 (2015, pp.93-104 http://dx.do.org/10.14257/juet.2015.8.5.09 Credt Rk Evaluato of Ole Supply Cha Face Baed o Thrd-party B2B E-commerce

More information

Conversion of Non-Linear Strength Envelopes into Generalized Hoek-Brown Envelopes

Conversion of Non-Linear Strength Envelopes into Generalized Hoek-Brown Envelopes Covero of No-Lear Stregth Evelope to Geeralzed Hoek-Brow Evelope Itroducto The power curve crtero commoly ued lmt-equlbrum lope tablty aaly to defe a o-lear tregth evelope (relatohp betwee hear tre, τ,

More information

Randomized Load Balancing by Joining and Splitting Bins

Randomized Load Balancing by Joining and Splitting Bins Radomzed Load Baacg by Jog ad Spttg Bs James Aspes Ytog Y 1 Itoducto Cosde the foowg oad baacg sceao: a ceta amout of wo oad s dstbuted amog a set of maches that may chage ove tme as maches o ad eave the

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

Analysis of one-dimensional consolidation of soft soils with non-darcian flow caused by non-newtonian liquid

Analysis of one-dimensional consolidation of soft soils with non-darcian flow caused by non-newtonian liquid Joural of Rock Mechacs ad Geotechcal Egeerg., 4 (3): 5 57 Aalyss of oe-dmesoal cosoldato of soft sols wth o-darca flow caused by o-newtoa lqud Kaghe Xe, Chuaxu L, *, Xgwag Lu 3, Yul Wag Isttute of Geotechcal

More information

Generalized Difference Sequence Space On Seminormed Space By Orlicz Function

Generalized Difference Sequence Space On Seminormed Space By Orlicz Function Ieaoa Joa of Scece ad Eee Reeach IJSER Vo Ie Decembe -4 5687 568X Geeazed Dffeece Seece Sace O Semomed Sace B Ocz Fco A.Sahaaa Aa ofeo G Ie of TechooCombaoeIda. Abac I h aewe defe he eece ace o emomed

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

Analysis of Two-Echelon Perishable Inventory System with Direct and Retrial demands

Analysis of Two-Echelon Perishable Inventory System with Direct and Retrial demands O Joural of Mathematc (O-JM) e-: 78-578 p-: 9-765X. Volume 0 ue 5 Ver. (ep-oct. 04) 5-57 www.oroural.org aly of Two-chelo erhable vetory ytem wth rect ad etral demad M. amehpad C.eryaamy K. Krha epartmet

More information

Automated Alignment and Extraction of Bilingual Ontology for Cross-Language Domain-Specific Applications

Automated Alignment and Extraction of Bilingual Ontology for Cross-Language Domain-Specific Applications Automated Agmet ad Extracto of gua Otoogy for Cross-Laguage Doma-Specfc Appcatos Ju-Feg Yeh, Chug-Hse Wu, Mg-Ju Che ad Lag-Chh Yu Departmet of Computer Scece ad Iformato Egeerg Natoa Cheg Kug Uversty,

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

An SVR-Based Data Farming Technique for Web Application

An SVR-Based Data Farming Technique for Web Application A SVR-Based Data Farmg Techque for Web Appcato Ja L 1 ad Mjg Peg 2 1 Schoo of Ecoomcs ad Maagemet, Behag Uversty 100083 Bejg, P.R. Cha [email protected] 2 Isttute of Systems Scece ad Techoogy, Wuy Uversty, Jagme

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks 0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg

More information

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time. Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E

More information

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Efficient Traceback of DoS Attacks using Small Worlds in MANET Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble

More information

Supply Chain Management Chapter 5: Application of ILP. Unified optimization methodology. Beun de Haas

Supply Chain Management Chapter 5: Application of ILP. Unified optimization methodology. Beun de Haas Supply Cha Maagemet Chapter 5: Ufed Optmzato Methodology for Operatoal Plag Problem What to do whe ILP take too much computato tme? Applcato of ILP Tmetable Dutch Ralway (NS) Bu ad drver chedulg at Coeo,

More information

GRADUATION PROJECT REPORT

GRADUATION PROJECT REPORT SPAM Flter School of Publc Admtrato Computer Stude Program GRADUATION PROJECT REPORT 2007-I-A02 SPAM Flter Project group leader: Project group member: Supervor: Aeor: Academc year (emeter): MCCS390 Graduato

More information

Study on Trust Evolution and Simulation Oriented to Cloud Services

Study on Trust Evolution and Simulation Oriented to Cloud Services Joral of Advaced Maagemet Scece Vol., No., Je 014 Stdy o Trst Evolto ad Smlato Oreted to Clod Servces Zho Ye School of Maagemet ad Egeerg, Nag Uversty, Nag, Cha [email protected] I ths paper, trst stdy s focsed

More information

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN Joural of Theoretcal ad Appled Iformato Techology 31 st Jauary 214. Vol. 59 No.3 25-214 JATIT & S. All rghts reserved. ISSN: 1992-8645 www.att.org E-ISSN: 1817-3195 VIDEO REPICA PACEMENT STRATEGY FOR STORAGE

More information

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks Low-Cost Sde Chael Remote Traffc Aalyss Attack Packet Networks Sach Kadloor, Xu Gog, Negar Kyavash, Tolga Tezca, Nkta Borsov ECE Departmet ad Coordated Scece Lab. IESE Departmet ad Coordated Scece Lab.

More information

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines (ICS) Iteratoal oural of dvaced Comuter Scece ad lcatos Vol 6 No 05 romato lgorthms for Schedulg wth eecto o wo Urelated Parallel aches Feg Xahao Zhag Zega Ca College of Scece y Uversty y Shadog Cha 76005

More information

Chapter Eight. f : R R

Chapter Eight. f : R R Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,

More information

Application of GA with SVM for Stock Price Prediction in Financial Market

Application of GA with SVM for Stock Price Prediction in Financial Market Iteratoa Joura of Scece ad Research (IJSR) ISSN (Oe): 39-7064 Impact Factor (0): 3.358 Appcato of GA wth SVM for Stock Prce Predcto Faca Market Om Prakash Jea, Dr. Sudarsa Padhy Departmet of Computer Scece

More information

On Application-level Load Balancing in FastReplica

On Application-level Load Balancing in FastReplica O Appcato-eve Load Baacg FastRepca Jagwo Lee, Gustavo de Vecaa Abstract I the paper, we cosder the probem o dstrbutg arge-sze cotet to a xed set o odes. I cotrast wth the most exstg ed-system soutos to

More information

The simple linear Regression Model

The simple linear Regression Model The smple lear Regresso Model Correlato coeffcet s o-parametrc ad just dcates that two varables are assocated wth oe aother, but t does ot gve a deas of the kd of relatoshp. Regresso models help vestgatg

More information

Report 52 Fixed Maturity EUR Industrial Bond Funds

Report 52 Fixed Maturity EUR Industrial Bond Funds Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:

More information

Questions? Ask Prof. Herz, [email protected]. General Classification of adsorption

Questions? Ask Prof. Herz, herz@ucsd.edu. General Classification of adsorption Questos? Ask rof. Herz, [email protected] Geeral Classfcato of adsorpto hyscal adsorpto - physsorpto - dsperso forces - Va der Waals forces - weak - oly get hgh fractoal coerage of surface at low temperatures

More information

CSSE463: Image Recognition Day 27

CSSE463: Image Recognition Day 27 CSSE463: Image Recogto Da 27 Ths week Toda: Alcatos of PCA Suda ght: roject las ad relm work due Questos? Prcal Comoets Aalss weght grth c ( )( ) ( )( ( )( ) ) heght sze Gve a set of samles, fd the drecto(s)

More information

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM

More information

Resource Management Model of Data Storage Systems Oriented on Cloud Computing

Resource Management Model of Data Storage Systems Oriented on Cloud Computing Resorce Maagemet Model of Data Storage Systems Oreted o Clod Comptg Elea Kaa, Yry Korolev Sat Petersbrg Electrotechcal Uversty "LETI" (ETU), Sat Petersbrg, Rssa {leaaa, yryg}@gmalcom Abstract Ths artcle

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

Relaxation Methods for Iterative Solution to Linear Systems of Equations

Relaxation Methods for Iterative Solution to Linear Systems of Equations Relaxato Methods for Iteratve Soluto to Lear Systems of Equatos Gerald Recktewald Portlad State Uversty Mechacal Egeerg Departmet [email protected] Prmary Topcs Basc Cocepts Statoary Methods a.k.a. Relaxato

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

Fault Tree Analysis of Software Reliability Allocation

Fault Tree Analysis of Software Reliability Allocation Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad [email protected]

More information

3.6. Metal-Semiconductor Field Effect Transistor (MESFETs)

3.6. Metal-Semiconductor Field Effect Transistor (MESFETs) .6. Metal-Semcouctor Fel Effect rator (MESFE he Metal-Semcouctor-Fel-Effect-rator (MESFE cot of a couctg chael potoe betwee a ource a ra cotact rego a how the Fgure.6.1. he carrer flow from ource to ra

More information

Finite Difference Method

Finite Difference Method Fte Dfferece Method MEL 87 Computatoa Heat rasfer --4) Dr. Praba audar Assstat Professor Departmet of Mechaca Egeerg II Deh Dscretzato Methods Requred to covert the geera trasport equato to set of agebrac

More information

Integrated Workforce Planning Considering Regular and Overtime Decisions

Integrated Workforce Planning Considering Regular and Overtime Decisions Poceedgs of the 2011 Idusta Egeeg Reseach Cofeece T. Dooe ad E. Va Ae, eds. Itegated Wofoce Pag Cosdeg Regua ad Ovetme Decsos Shat Jaugum Depatmet of Egeeg Maagemet & Systems Egeeg Mssou Uvesty of Scece

More information

Simple Linear Regression

Simple Linear Regression Smple Lear Regresso Regresso equato a equato that descrbes the average relatoshp betwee a respose (depedet) ad a eplaator (depedet) varable. 6 8 Slope-tercept equato for a le m b (,6) slope. (,) 6 6 8

More information

A particle swarm optimization to vehicle routing problem with fuzzy demands

A particle swarm optimization to vehicle routing problem with fuzzy demands A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato

More information

Software Reliability Index Reasonable Allocation Based on UML

Software Reliability Index Reasonable Allocation Based on UML Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author

More information

Sequences and Series

Sequences and Series Secto 9. Sequeces d Seres You c thk of sequece s fucto whose dom s the set of postve tegers. f ( ), f (), f (),... f ( ),... Defto of Sequece A fte sequece s fucto whose dom s the set of postve tegers.

More information

Study on prediction of network security situation based on fuzzy neutral network

Study on prediction of network security situation based on fuzzy neutral network Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

Optimization Model in Human Resource Management for Job Allocation in ICT Project

Optimization Model in Human Resource Management for Job Allocation in ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Saghamtra Mohaty Malaya Kumar Nayak 2 2 Professor ad Head Research

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ  1 STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ

More information

In the UC problem, we went a step further in assuming we could even remove a unit at any time if that would lower cost.

In the UC problem, we went a step further in assuming we could even remove a unit at any time if that would lower cost. uel Schedulg (Chapter 6 of W&W.0 Itroducto I ecoomc dpatch we aumed the oly lmtato were o the output of the geerator: m g. h aumed that we could et ge to ay value we dered wth the rage, at ay tme, to acheve

More information

How To Balance Load On A Weght-Based Metadata Server Cluster

How To Balance Load On A Weght-Based Metadata Server Cluster WLBS: A Weght-based Metadata Server Cluster Load Balacg Strategy J-L Zhag, We Qa, Xag-Hua Xu *, Ja Wa, Yu-Yu Y, Yog-Ja Re School of Computer Scece ad Techology Hagzhou Daz Uversty, Cha * Correspodg author:[email protected]

More information

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1 akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of

More information

Constrained Cubic Spline Interpolation for Chemical Engineering Applications

Constrained Cubic Spline Interpolation for Chemical Engineering Applications Costraed Cubc Sple Iterpolato or Chemcal Egeerg Applcatos b CJC Kruger Summar Cubc sple terpolato s a useul techque to terpolate betwee kow data pots due to ts stable ad smooth characterstcs. Uortuatel

More information

Mathematical model of service quality performance s computing of multiservice network

Mathematical model of service quality performance s computing of multiservice network Mathematca mode of erce quaty performance computng of muterce networ Tuemoa Gufarda, Internatona academy of bune, maty, Kazahtan btract Th artce deoted to effectene of muterce networ functonng n order

More information

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,

More information

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa

More information

Finito: A Faster, Permutable Incremental Gradient Method for Big Data Problems

Finito: A Faster, Permutable Incremental Gradient Method for Big Data Problems Fto: A Fater, Permutable Icremetal Gradet Method or Bg ata Problem Aaro J. eazo Tbéro S. Caetao Jut omke NICTA ad Autrala Natoal Uverty [email protected] [email protected] [email protected]

More information

Mina Baliamoune-Lutz ᵃ, Zuzana Brixiova ᵇ, and Mthuli Ncube ᶜ 1. ᵃ University of North Florida and African Center for Economic Transformation

Mina Baliamoune-Lutz ᵃ, Zuzana Brixiova ᵇ, and Mthuli Ncube ᶜ 1. ᵃ University of North Florida and African Center for Economic Transformation SKILLS, GENDER AND PRODUCTIVE ENTREPRENEURSHIPS IN AFRICA Ma Baamoe-Lz ᵃ, Zzaa Brxova ᵇ, ad Mt Ncbe ᶜ 1 ᵃ Uvery of Nort Forda ad Afrca Ceter for Ecoomc Traformato ᵇ Afrca Deveopmet Bak ad IZA ᶜ Afrca Deveopmet

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

10.5 Future Value and Present Value of a General Annuity Due

10.5 Future Value and Present Value of a General Annuity Due Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the

More information

10/19/2011. Financial Mathematics. Lecture 24 Annuities. Ana NoraEvans 403 Kerchof [email protected] http://people.virginia.

10/19/2011. Financial Mathematics. Lecture 24 Annuities. Ana NoraEvans 403 Kerchof AnaNEvans@virginia.edu http://people.virginia. Math 40 Lecture 24 Autes Facal Mathematcs How ready do you feel for the quz o Frday: A) Brg t o B) I wll be by Frday C) I eed aother week D) I eed aother moth Aa NoraEvas 403 Kerchof [email protected] http://people.vrga.edu/~as5k/

More information

Performance Attribution. Methodology Overview

Performance Attribution. Methodology Overview erformace Attrbuto Methodology Overvew Faba SUAREZ March 2004 erformace Attrbuto Methodology 1.1 Itroducto erformace Attrbuto s a set of techques that performace aalysts use to expla why a portfolo's performace

More information

Experimental Comparison of Genetic Algorithm and Ant Colony Optimization to Minimize Energy in Ad-hoc Wireless Networks

Experimental Comparison of Genetic Algorithm and Ant Colony Optimization to Minimize Energy in Ad-hoc Wireless Networks Proceedgs of e World Cogress o Egeerg ad Computer Scece 013 Vol II, 3-5 October, 013, Sa Fracsco, USA Expermetal Comparso of Geetc Algorm ad At Coloy Optmato to Mme Eergy Ad-hoc Wreless Networs Ibuuola

More information

Must the growth rate decline? Baumol s unbalanced growth revisited

Must the growth rate decline? Baumol s unbalanced growth revisited Must the growth rate decle? Baumol s ubalaced growth rested Ncholas Oulto Bak of Eglad, Threadeedle Street, Lodo, ECR 8AH. The ews expressed are those of the author, ot ecessarly those of the Bak of Eglad.

More information

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center 200 IEEE 3rd Iteratoal Coferece o Cloud Computg Dyamc Provsog Modelg for Vrtualzed Mult-ter Applcatos Cloud Data Ceter Jg B 3 Zhlag Zhu 2 Ruxog Ta 3 Qgbo Wag 3 School of Iformato Scece ad Egeerg College

More information

How To Make A Supply Chain System Work

How To Make A Supply Chain System Work Iteratoal Joural of Iformato Techology ad Kowledge Maagemet July-December 200, Volume 2, No. 2, pp. 3-35 LATERAL TRANSHIPMENT-A TECHNIQUE FOR INVENTORY CONTROL IN MULTI RETAILER SUPPLY CHAIN SYSTEM Dharamvr

More information

Application of Grey Relational Analysis in Computer Communication

Application of Grey Relational Analysis in Computer Communication Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author

More information

AnySee: Peer-to-Peer Live Streaming

AnySee: Peer-to-Peer Live Streaming ysee: Peer-to-Peer Lve Streamg School of Computer Scece ad Techology Huazhog Uversty of Scece ad Techology Wuha, 40074, Cha {xflao, hj, dfdeg }@hust.edu.c Xaofe Lao, Ha J, *Yuhao Lu, *Loel M. N, ad afu

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information