The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper investigates the condition-based maintenance (CBM) that concerns the component replacement strategy based on the estimation of the failure probability distribution. To obtain the accurate estimation of the distribution, specifically in non-linear case, an improved model-based Monte Carlo method, the unscented particle filter (UPF), is introduced. With the estimation of the failure probability,...
Power grid integrity verification is critical for reliable chip design. Vectorless power grid verification provides a promising approach to evaluate the worst-case voltage fluctuations without the detailed information of circuit activities. Vectorless verification is usually required to solve numerous linear programming problems to obtain the worst-case voltage fluctuation throughout the grid, which...
We compare two types of preconditioners for GPU-Accelerated conjugate gradient solver. For the standard IC preconditioner, we exploit level scheduling to increase multi-thread parallelism of sparse triangular solve on GPU. Meanwhile, we propose a novel reordering technique to maximize the coalescing of global memory accesses. For the approximate inverse preconditioner SSOR-AI, we extend it to second...
This paper motivates and describes the use of Response Surface (RS) with Probability Collectives (PC) to handle large-scale optimization problems. The main characteristic of PC is that it optimizes the probability distribution of the variables rather than their values, thus different types of variables may be integrated into optimization procedure. The RS is used to approximate the utility evaluation...
In this paper, we first present a classification for existing GPS positioning algorithms based on their features of mathematical operations in the calculating process and the accuracy of the solutions solved. Then we systematically evaluate and compare the performance of GPS algorithms for practical environments. Performance metrics include normalized execution time and the absolute error. We examine...
Clustering is an important technique for intelligence computation such as trust, recommendation, reputation, and requirement elicitation. With the user centric nature of service and the user's lack of prior knowledge on the distribution of the raw data, one challenge is on how to associate user quality requirements on the clustering results with the algorithmic output properties (e.g. number of clusters...
Approximation techniques are widely used in structural reliability analysis to build computationally inexpensive surrogate models to replace expensive-to-run computer analysis codes. Recently, kriging models are frequently utilized to construct surrogate approximations; however, they may be inefficient for systems having with a large number of design variables. Therefore, a new method-cokriging, which...
In the theory of the concept lattices, the structure of a concept lattice is the base of data analysis and is very important. Aim to three kinds of concept lattices for a certain formal context, the concept lattice of complementary context, the object-oriented concept lattice and the property-oriented concept lattice, this paper mainly studies their lattice construction methods. The method only uses...
This paper studies the construction of object oriented concept lattice through the combination of formal contexts. Based on two original formal contexts with a fixed object set, the construction method for all object oriented concepts and corresponding concept lattice of the combined formal context is obtained. The method can be generalized to the case of many original formal contexts. This method...
Due to its compact and distributed nature, loopy belief propagation has been proved to be theoretically appropriate as a basis to systematically deal with uncertainties with incomplete or corrupted observations in the broad applications of wireless sensor networks. However, the transmissions of massive belief messages of loopy belief propagation could become a serious concern from the energy consumption...
Motion estimation (ME) is one of the bottlenecks in terms of the computational cost in a video encoder system. In this paper, we present a cost-effective method to calculate the "Vector Edge" of the current frame. We store all the vectors' information within a frame and put them in the Laplacian of Gaussian edge detection operator. It is similar to the image edge detection but we need to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.