The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
2016 IEEE Intl Conference on Computational Science and Engineering (CSE) and IEEE Intl Conference on Embedded and Ubiquitous Computing (EUC) and 15th Intl Symposium on Distributed Computing and Applications for Business Engineering (DCABES)
Swarm intelligence metaheuristics (SIM) are a special kind of population-based algorithms, inspired by a collective and social behavior of some species. SIM have become mostly common used for multi-objective optimization problems (MOPs). However, almost all of them are designed for unconstrained optimization problems. In this work, we intend to present a new design to handle constraints with SIM to...
Mobile cloud computing is a rapidly increasing technology where user's demand, for cloud contents, might exceed the capability of mobile networks even with 5G. Multicast communication can offer excellent service for multiple applications, but in some scenarios its efficiency can drop to reach that of unicast. In this work, we will propose a mechanism to optimize the allocation of radio resources when...
An automatic sleep apnea detection algorithm is essential not only for alleviating the onus of physicians of analyzing a high volume of data but also for making a portable sleep quality evaluation device feasible. Most prior studies are either multi-lead based or yield poor accuracy which hinder the aforementioned goals. In this work, we propound a statistical and spectral feature based method for...
The Galerkin Gradient Least Square method is here proposed to simulate the sound holography inside the church of the Royaumont abbey, which has been destroyed in 1792. The church is restored with a computer aided design model, which is then meshed by a voxelization algorithm for a finite element analysis. Helmholtz equation is used for modeling the acoustics phenomena. To increase the accuracy of...
Diabetes is one of the important issues in the medical field in which blood glucose level control and regulation needs to permanent care. Determination of appropriate rate of insulin injection in order to blood glucose level stabilization to a normal level is vital for diabetics. In this paper, optimal plasma blood glucose tracking using subcutaneous insulin administration is investigated. Here one...
Selection cooperation is an effective solution for cooperative communications and the automatic repeat request (ARQ) protocol can provide additional diversity gain for wireless networks. In this work, considering a large network where direct transmissions only exist in the neighbors of each node, we investigate an improved diffusion selection cooperation protocol integrated with ARQ, and taking into...
A systematic synthesis method to generate transconductance filters using nodal admittance matrix (NAM) expansion is proposed. The obtained circuits with two input voltage terminals and three output currents employing only two grounded capacitors and three resistors can be used to realize the transconductance-mode universal filter. The synthesized filters enjoy the properties of orthogonal controllability...
Currently multimedia contents dominate the information exchanged in Internet, particularly through social networks. Each actor on the Internet becomes producer and consumer of contents. Nevertheless, social network and other traditional collaborative environments present limitations regarding content selection, categorization, aggregation, linking and interoperability, and usage control and privacy...
Over the past few years, we have witnessed the rapid growth of Massive Open Online Courses (MOOCs). More and more researches focus on MOOCs, especially grade prediction, due to the low completion rate in MOOCs. In this paper, we proposed a grade prediction model to automatically predict students' grades based on students' previous performances. We utilized regression, back-propagation neural network...
In order to run Computational Fluid Dynamics (CFD) codes on large scale infrastructures, parallel computing has to be used because of the computational intensive nature of the problems. In this paper we investigate the 3D version of the ADAPT platform where we do a coupling between flow partial differential equations and a Poisson equation. This coupling leads to a linear system that we solve using...
Mobile devices such as smartphones and tablets are provisioned with multiple network interfaces capable of data connectivity such as the cellular radio, WiFi, bluetooth, and others. However, restrictions from the carrier side allow us to use only one of the interfaces at any given time, and not allow us to fully utilize all the data links in a mobile device's arsenal. We propose MIC, an architecture...
Optimal multiprocessor real-time scheduling can achieve full system utilization with implicit-deadline periodic task sets. However, worst case execution time (WCET) analysis is difficult on state-of-the-art hardware/software platforms because of the complex hierarchy of shared caches and multiprogramming. The actual case execution time (ACET) of each task is usually shorter than its WCET, and imprecise...
In the last years, many works have proposed Building Management Systems (BMS) or other tools that allowed to actually exploit the smart buildings infrastructures. Such new systems allow users to define their own policies (generally in the shape of rules exploiting logic formulas) to program the building behavior. Multi-user managements is not totally supported in modern BMS though. Multi-tenant implications...
The objective of this paper is to discuss different scenarios for Principal Component Analysis classifier implemented for email filtering process (Ham vs. spam emails). The study highlights on the variation of the accuracy of these classifiers with respect to the variation in feature preprocessing. Four scenarios were considered: Scenario 1: Ham and Spam classes are represented with different features...
In this paper, we present, evaluate and analyse the performance of parallel synchronous Jacobi algorithms by different partitioned procedures including band-row splitting, band-row sparsity pattern splitting and substructuring splitting, when solving sparse large linear systems. Numerical experiments performed on a set of academic 3D Laplace equation and on a real gravity matrices arising from the...
Let G = (V, E) be a unicyclic simple undirected graph. In this paper, we investigate the spectra of a particular class of unicyclic graphs G(q, n1) where q is the size of the unique cycle. Each vertex of the unique cycle is attached to n1 vertices. We provide the "exact values" of the extremal eigenvalues of the adjacency matrix A and the Laplacian matrix L of G, in contrast to lower and...
The High Performance Computing field is striving for the next computational step: exascale (1018 floating point operations per second). The first machine at this scale is expected at horizon 2020 and some French companies such as Atos/Bull are already working on it. Their supercomputer, Sequana, will deliver the expected computational power using either Xeon Phi or GPU accelerators. However these...
Web applications differ from web sites as they have wide range of interactive features/functionalities and dynamic content. The content delivered via thin client or server driven architecture vary in size, structure and visual design. To accommodate such rich content care should be taken when designing user interface. Various methodologies exist to deliver the content to the users in an efficient...
In this paper, we are presenting QR factorization algorithms that can tolerate process crashes and soft errors (bit flips). Our algorithms take advantage of structural properties of a QR factorization algorithm referred to as "communication-avoiding". We show that, exploiting these properties, our resilient, robust algorithms modify the communication pattern of the computation but do not...
As an important section in the chain of semiconductor products manufacturing, dispensing techniques and relevant dispensers drawn increasing attentions of the researchers and engineers in recent years. In some applications, the dispenser cycles are required to be completed within 2 ms and the corresponding dot diameters are usually in micrometer scale, and sometimes even in nanometer scale when extremely...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.