The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Exploring the design space of the memory hierarchy requires the use of effective methodologies, tools, and models to evaluate different parameter values. Reuse distance is of one of the locality models used in the design exploration and permits analytical cache miss estimation, program characterization, and synthetic trace generation. Unfortunately, the reuse distance is limited to a single locality...
Application of neural networks for direct prediction of lateral-directional force and moments coefficients from the measured flight data of the research aircraft is proposed in this paper. Proposed model of neural networks appears to be a suitable practical approach to develop relationship between flight variables. This relationship eliminates the need of aerodynamic model as well as thrust model...
Cloud outages, no matter how long, are responsible for large financial losses. Cloud providers look for solutions that provide high availability even in failure cases. Redundancy has been often used as an alternative; however it has a cost, and depending on the redundancy model, we can have different levels of availability. Beyond that, adding more resources also means adding more complexity and more...
This paper describes a study demonstrating a new method of state-of-charge (SoC) estimation for batteries in real-world electric vehicle applications. This method combines realtime model identification with an adaptive neuro-fuzzy inference system (ANFIS). In the study, investigations were carried down on a small-scale battery pack. An equivalent circuit network model of the pack was developed and...
In this paper, a new stochastic gradient estimator based on the likelihood ratio (LR) method and infinitesimal perturbation analysis (IPA) will be given, which can be used for sensitivity estimation for a special case of discontinuous performance functions. The estimator is applied to an American call option pricing problem, which can greatly reduce the computational burden compared with other estimators...
The literature on Small and Medium Enterprises often discusses the emergent nature of the product development processes, however; it often does not address the lack of planning tools within such organizations. We aim to fill the gap in tool support for the planning process, by developing a discrete event simulation model to compute lead times of product development projects. The developed model explicitly...
This paper presents a novel dynamic power estimation technique for differently configured multilevel caches at very fine granular level. High performance power extraction tool has been developed to monitor the dynamic power dissipation for modern high speed multilevel caches of microprocessor. The microprocessor furnished with multilevel caches is assembled as a virtual platform using different libraries...
An adaptive unscented Kalman filter is presented, in this algorithm, modified Sage-Husa noise statistics estimator is introduced to estimate the process noise variances adaptively. The nonlinear filter is applied in INS alignment with large azimuth error. Simulation results show that adaptive Unscented Kalman filter performance well in the special case.
The evaluation system is investigated for the disturbing effect of optical countermeasure device to photoelectrical guided weapon in this paper. The general optical countermeasure simulation model is established by using photoelectrical countermeasure simulation test to conduct the estimation of countermeasure effect. The target-missing quantity of guided weapon and guided precision is designated...
This paper presents the criteria and performance indicators used for a structured analysis of two evaluation methods for the applied capabilities of software usage: computer based exam and group project assignment. The results of the application of this structured analysis are presented and discussed.
We present in this paper a framework for performance prediction of parallel programs on hierarchical clusters. This framework is mainly designed for the use by the switching functions in parallel adaptive applications. Indeed, the principal referred objectives by this framework are the accuracy of the prediction and the rapidity of the prediction process. To achieve these objectives, our framework...
Simulations of epidemic spread is an appealing approach to design intervention programs against influenza epidemic. Agent-based approach is particularly useful, since it enable us to administrate and evaluate effectiveness of various intervention measures in the simulated city. On the other hand, observation date are obtained as macroscopic information. Hence, we need to extract some macroscopic information,...
We present a computationally efficient simulation procedure for point estimation of expected shortfall. The procedure applies tools for ranking and selection to allocate more computational resources to estimation of the largest losses, which are those that affect expected shortfall. Given a fixed computational budget, our procedure estimates expected shortfall with a much lower mean squared error...
In this study, we consider an order promising problem at parallel machine shop where orders arrive dynamically. We develop a real-time due-date quoting method for the problem. In the method, the inventory status of the shop as well as the various scheduling methods used in the shop are taken into account. The quoting needs to be done very fast for the due-date negotiation between sales managers and...
In this paper, a new sensor selection scheme for target tracking in binary sensor networks using auxiliary particle filter is proposed that leads to computation complexity reduction. Binary sensor networks provide a set of binary signals based on presence or absence of target in detection region of sensors. Computation complexity of the particle filtering can be a major problem for its practical use...
One of the most important simulation applications is the comparison of alternatives. Possible decisions, operating procedures, system designs can be compared through simulation experiments before implementing them in the real life. Stochastic simulation leads to variance of the estimated difference between systems performance measures. The goal of simulation experiments is to obtain point and interval...
As trust management can address the new security challenges in pervasive computing environments, we present our pervasive trust model TM-RMRP which is composed of input factors and trust evaluation. With the model presented, anonymous entities can collaborate with trustful parties without central security managers. To reduce or even avoid inappropriate or inaccurate recommendations, we introduce the...
Laboratory assignments for Embedded System courses are usually performed with a hardware-based training kit that equipped with an embedded system board, software development tools, and optionally an emulator for debugging. Using the hardware-based kits has some demerits such as high initial setup cost, burdensome maintenance, lacks of adaptability to industry evolution, and restricted educational...
Consider the problem of estimating the expectation of a non linear function of a conditional expectation. This function is allowed to be non-differentiable and discontinuous at a finite set of points to capture practical settings. We develop a nested simulation strategy to estimate this via simulation and identify bias and optimized mean square error allocation. We show that this mean square error...
We consider two-stage procedures for selection and multiple comparisons, where the variance parameter is estimated consistently. We examine conditions under which the procedures are asymptotically valid in a general framework. Our proofs of asymptotic validity require that the estimators at the end of the second stage are asymptotically normal, so we require a random-time-change central limit theorem...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.