The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Based on the quantum genetic algorithm, a new improved quantum genetic algorithm is proposed by introducing the grouping optimization strategy of hybrid shuffled frog-leaping algorithm and combining the quantum variation and simulated annealing receiving criteria. The improved algorithm is applied to function optimization. The experimental results show that the proposed algorithm can improve the performance...
Boolean SAT solving can be used to find a minimum-size logic network for a given small Boolean function. This paper extends the SAT formulation to find a minimum-size network under delay constraints. Delay constraints are given in terms of input arrival times and the maximum depth. After integration into a depth-optimizing mapping algorithm, the proposed SAT formulation can be used to perform logic...
We develop an algorithm to optimize routing and channel assignment for multi-channel wireless mesh networks. We apply our proposed algorithm to a cognitive radio system using TV white space channels, which has been developed in previous researches. To maximize the capacity and throughput of such multi-channel mesh networks, conventional algorithms separately deal with two problems, the channel assignment...
Internet of Things (IoT) platforms that handle Big Data might perform poorly or not according to the goals of their operator (in terms of costs, database utilization, data quality, energy-efficiency, throughput) if they are not configured properly. The latter configuration refers mainly to system parameters of the data-collecting gateways, e.g., polling intervals, capture intervals, encryption schemes,...
In this paper we define and study the properties of projected don't cares, a category of don't cares dynamically built by the minimization algorithm during the synthesis phase. Our target is to exploit projected don't cares properties in order to obtain more compact networks. In particular, we show the use of projected don't care conditions in two synthesis techniques, i.e., using a Boolean and an...
Sufficient computing resources available at future generation routers in the access/aggregation networks can be pooled to form a cloud at edge, which we call Access/Aggregation Network Cloud (or ANC). An ANC can be used to handle some of the information processing conventionally done inside the enterprise networks. ANC computing can also result in a much less delay and more flexibility than if such...
Modern synthesis flows apply a series of technology independent optimization steps followed by mapping algorithms which bind the optimized network to a specific technology library. As the exact solution of the mapping problem is computationally intractable, algorithms used in practice use heuristic, typically tree-based approaches. The application of these algorithms results in mapped but suboptimal...
Recently, one of the main criteria used to evaluate reversible circuit designs is quantum cost. In this paper, an approach to reducing quantum cost of small-width reversible circuits is presented. Using our tool we have shown that for known benchmarks as well as designs taken from recent publications it is possible to obtain substantial savings in quantum cost (35% on average for 4-input benchmarks)...
In this paper, we present TIPO, a heuristic algorithm for timing constrained power optimization. The algorithm utilizes Dynamic Programming-like (DP_like) search method with consistency iteration and a fast gradient-based multiplier selection method that provides an effective set of Lagrange multipliers. Compared to the previous subgradient method provided by DP_like approach, TIPO is considerably...
Although many efficient high-level algorithms have been proposed for the realization of Multiple Constant Multiplications (MCM) using the fewest number of addition and subtraction operations, they do not consider the low-level implementation issues that directly affect the area, delay, and power dissipation of the MCM design. In this paper, we initially present area efficient addition and subtraction...
In this paper, we proposed a three-layer dynamic gateway strategy, which integrates mobile IP and AODV protocol. This is one kind of multi-gateway mechanisms. By using irregular nodes not attached fixed gateway as gateway in Ad Hoc network, network overload will decreased. And the efficiency of the network will increased. According to the distance, the registered number of nodes and traffic-weighted...
In this paper, the authors make optimization to multi-objective function of cognitive radio with the help of quantum genetic algorithm(QGA) based on clonal selection. And a clonal selection quantum (CSQ) has been put forward by quantum genetic algorithm and immune clonal selection, and the algorithm have been improved. It produces encouraging results when we apply the algorithm to the function optimization...
The injection mold optimization problems always require huge computer resources, so the grid is a good choice for solving these problems. But for the heterogeneous, distributed and dynamic characters of the grid resources, it is difficult to finish the complex problems efficiently in collaborative way by grid. Based on the Globus Toolkits 4, a four-layer Mold Design Grid (MDG) platform was constructed...
Error correction is an effective way to mitigate fault attacks in cryptographic hardware. It is also an effective solution to soft errors in deep sub-micron technologies. To this end, we present a systematic method for designing single error correcting (SEC) and double error detecting (DED) finite field (Galoisfield) multipliers over GF(2m). The detection and correction are done on-line. We use multiple...
In this paper a BISR architecture for embedded memories is presented. The proposed scheme utilises a multiple bank cache-like memory for repairs. Statistical analysis is used for minimisation of the total resources required to achieve a very high fault coverage. Simulation results show that the proposed BISR scheme is characterised by high efficiency and low area overhead, even for high defect densities...
IEEE P1900.4 is an emerging standard for optimized radio resource utilization where cognitive radio technologies are used for efficient spectrum utilization. In this paper, we design and implement a cognitive wireless network system based on open documents of IEEE P1900.4, and evaluate its performance using UDP streaming and HTTP download. Our experiments show interesting results that total network...
The ever changing demands on computational resources has information systems managers looking for solutions that are more flexible. Using a ldquobigger boxrdquo that has more and faster processors and permanent storage or more random access memory (RAM) is not a viable solution as the system usage patterns vary. In order for a system to handle the peak load adequately, it will go underutilized much...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.