The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposed a novel Chinese text topic extraction method based on Latent Dirichlet Allocation model. This method was practiced in CCL, an authoritative Chinese corpus, to extract topics for its nine categories. Our results exhibit LDA has better performance in precision rate than any other comparable techniques.
The rapid development of the Internet provides a platform for the sharing of resource, and it has become a focus of the information society with user's increasing demand for network services year by year. With the development of cloud computing technology, it provides a solution for resource sharing. But due to uncertainty of cloud computing user requests, if there is not reasonable allocation and...
NAND Flash has been widely used in consumer electronic devices, especially in SSDs (Solid State Disks). However, with the process scaling down, its inherent imperfection will be more severe, such as the limited endurance, asymmetric speed of programming and read. While a traditional cache mechanism can improve the performance partly, it can't reduce the unnecessary writes to NAND Flash resulting from...
Large-scale cluster scheduling and management systems are becoming a dominant platform for a variety of applications and services. These complex “cloud” systems often run on clusters of thousands of unreliable commodity machines and mush handle all kinds of failures, schedule and deployment requirements while achieving the maximum resource utilization. We take YARN to a full analysis and argue that...
This article takes the multi-weapon formation coordination attack ground target as the background. We have established the mathematical model of the ground maneuvering target with the constraint space factor. We design an anytime algorithm for solving this kind of optimization problem based on the idea of distributed cooperative auction algorithm and give the method to optimize the auction algorithm...
Multiple resources allocation in large scale datacenter has been widely studied and used in recent years. However, the existing scheduling methods have some shortcomings in the heterogeneous environment, such as starving certain jobs, leaving some important resources unallocated, and decreasing system throughput. In this paper, we generalize the most popular multi-resource scheduling algorithm, Dominant...
Although personalized recommendation technology has been widely used in the Internet, there are still some problems which should be solved, such as data sparseness problem, “cold start” problem. The paper proposes a multi-B2C crossing ranking recommendation algorithm. According to the new user “cold start” problem, the paper proposes different categories of electronic commerce website access multi-B2C...
Distributed Real-time Embedded (DRE) systems working in open environments often need to enforce utilization bounds on multiple processors in order to manage CPU resources adaptively even when task execution times are unforeseeable. An event-based utilization control algorithm is proposed, and the algorithm applies to mixed (continuous and discrete) rate adaptation in DRE systems including tasks that...
Deep convolutional neural networks (CNN) is highly efficient in image recognition tasks such as MNIST digit recognition. Accelerators based on FPGA platform are proposed since general purpose processor is disappointing in terms of performance when dealing with recognition tasks. Recently, an optimized FPGA-based accelerator design (work 1) has been proposed claiming best performance compared with...
With the development of integrated circuit technology, the NoC(Network-on-Chip) has become a research hotspot in recent years. In this paper, we analyze the relevant theories of NoC, especially about the NoC router, as it plays a very important role for connecting the network. We design a low latency NoC router based on the wormhole virtual channel switching, and implement it on RTL (Register Transfer...
In this paper, we propose an improved design of expanding window fountain (EWF) codes over the binary input additive white Gaussian noise (BIAWGN) channels. The encoding process is modified to get almost regular variable node degree distributions. Compared with the conventional EWF codes, our proposed scheme can lower the error floor. Furthermore, we combine the EWF encoding process with unequal power...
Aiming the problem that it is difficult for the stationary spectrum allocation method of existing HF access network to meet the requirement of intelligent frequency hopping technology, the communication requirement of intelligent frequency hopping HF access network is analyzed in this paper, to come up with the dynamic frequency spectrum allocation strategy and algorithm of maximum handling capacity...
Fast and high utility channel allocation is one of the key issues of cognitive radio. In this paper, the channel allocation is formulated as a one-to-one matching game, and a distributed user-channel stable matching algorithm with low complexity is proposed to optimize the utility. We apply the algorithm to a hybrid underlay/overlay cognitive network in which secondary users utilize different manners...
Specific to the maximization of the system throughput, the joint resource allocation schemes for Device-to-Device (D2D) communication are proposed. Another purpose of the joint resource allocation schemes is to avoid the strong interference between cellular communication and the D2D communication. The core strategy of the algorithm is to establish a throughput matrix and find maximum throughput according...
This paper develops a modulated platform for the resource management of wireless public network to offer monthly analysis and comparison of data communication cards. The platform is consisted of three modules, namely the management module for public communication resource, operator bill module and distribution and measurement automation module. Compared with the conventional management platform, the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.