The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper investigates a specific NP-hard problem by comparing a depth-first search and a depth-first branch-and-bound algorithm as applied to network topology configuration in wireless ad hoc network planning. The vast amount of possible solutions in medium to large NP-hard problems makes algorithm methodology very important. State space algorithms are used to traverse through the solution space...
We propose an adaptive service model that maximizes the amount of service that spectrum users (SUs) achieve from accessing DSA systems. The proposed model allows SUs to utilize available spectrum efficiently by enabling them to locate spectrum opportunities in a distributed manner, thereby maximizing the long-term rewards that SUs receive. In this model, SUs adapt their required level of service with...
The visual inspection can help to reveal patterns that would be computationally rather difficult to reveal. The aim of this paper is to present a program to visualize DNA sequence and cluster analysis this sequence. The program visualizes either whole given sequence, or some fragments of it uses track-based visualization. Entire system is implemented in the programming language C#.
The paper proposes a method for locating design errors at the source-level of hardware description language code using the design representation of High-Level Decision Diagram (HLDD) models. The method is based on backtracing the mismatched and matched outputs of the system under verification on HLDDs. Experiments on a set of sequential register-transfer level benchmarks show that the method is capable...
Several metaheuristic algorithms based on nature-inspired phenomena have been developed to optimize non linear functions. Evolutionary systems, swarming and human immune systems have helped in development of many optimizing algorithms like genetic algorithms, particle swarm optimization and CLONALG. A novel algorithm has been proposed based on the popular belief of reincarnation where human is considered...
The heterogeneous fleet vehicle routing problem with time windows is a variant of the classical vehicle routing problem. This paper defines a mathematical model of this problem and proposes a variable neighborhood tabu search algorithm to solve it. The initial solution is obtained by GENIUS and the giant tour algorithm. Our algorithm employs a variable neighborhood mechanism to search the optimal...
With the increasing popularity and development of e-commerce and information technology, multi-attribute bilateral matching problem has been receiving more and more attention. In this paper, multi-attribute bilateral matching problem is discussed based on the consideration of stable matching. Concepts and definitions of multi-attribute bilateral stable matching are presented firstly, followed by the...
In order to improve operation efficiency and customer satisfaction and to minimize the turnaround time of vessels at container terminals, a berth allocation problem (BAP) was formulated. An adaptive artificial fish swarm algorithm (AFSA) was proposed to solve it. Firstly, the basic principle and the algorithm design of the AFSA were introduced. Then, for a test case, computational experiments explored...
How to keep local features of the mesh and adaptive subdivision becomes the research hotspot. Therefore, this paper proposes an adaptive subdivision algorithm with mesh segmentation. This algorithm puts forward a new method of the initial segmentation based on the mesh analyses of the regional growth. And on the basis of the Loop subdivision, the paper gives an adaptive subdivision that can effectively...
In this paper, we carry out a detailed investigation on two Train Inauguration Protocols proposed by WG43 for IEC 61375-2-5: ETB Train Inauguration (ETBTI) and Train Topology Discovery Protocol(T2DP). ETBTI uses Layer 2 LLDP to discovery neighbor peers and uses Layer 3 ETBIP to broadcast the information of single node to all the others. On the other hand, T2DP focuses on Layer 2 and modifies LLDP...
Geometric precisions are incorporated into a relational database from the perspective of geometric parameter precision design of the new generation of GPS and using the database technology. The processes can be simulated of their reasoning and decision-making in solving mechanical problems combining the theoretical knowledge, factual data and heuristic knowledge from the experience of specialists...
The flow of information in the network currently existing attacks and malicious damage, a privacy protection algorithm based on the maximum greedy is proposed, the data privacy acts as weights between nodes in network diagram , change these weights to achieve the protection of important data, by obtaining the shortest path way to ensure that efficiency is not influenced ,the experimental results show...
This paper presents a cost-effective approach to design an embedded autopilot system for a 4-rotor aerial vehicle. The system is targeted for autonomous control research, and it consists of an onboard system and a ground station. The onboard system interfaces with the vehicle and provides data link for sensor measurements and control data. The ground station provides a user-friendly interface for...
Reservoir optimal operation is a nonlinear, multi-stage and strong constraint combinatorial optimization problem. As the standard particle swarm optimization (SPSO) easily trapped into local optima, this paper proposes a hybrid algorithm combining particle swarm optimization algorithm with chaotic search algorithm, also referred to as CPSO algorithm. Making use of the stochastic property and ergodicity...
Keyword extraction is an important application in the area of information technology. Automatic keyword extraction can help people know what is the article primarily talking about without reading the long passage carefully. This paper mainly introduced a keyword extraction algorithm using pagerank on Synonym. Firstly, the content in a single document is represented as a weighted synonym co-occurrence...
Information-theoretic cost functions such as minimization of the error entropy (MEE) can extract more structure from the error signal, yielding better results in many realistic problems. However, adaptive filters (AFs) using MEE methods are more computationally intensive when compared to conventional, mean-squared error (MSE) methods employed in the well-known, least mean squares (LMS) algorithm....
We describe the methodology; the design and the implementation of scheduler block of interconnect. The scheduler block is implemented in Verilog using SYNOPSYS tool's DVE and Design_vision. The interconnect is capable of handling 72 bit packets and a total of 32 packets at a time. There are total 8 devices and we have to establish the communication between them. Each device consists of an input block...
Large-scale data-intensive streaming applications in various science fields feature complex DAG-structured workflows comprised of distributed computing modules with intricate inter-module dependencies. Supporting such workflows in high-performance network environments and optimizing their throughput are crucial to collaborative scientific exploration and discovery. We formulate workflow mapping as...
Selection of partners is one of the critical problems of Virtual Enterprise. In the paper, according to the deficiency in the existed quantitative methods, a partners-selection of optimization mathematic model is proposed, taking the advantages of simulated annealing algorithm and genetic algorithm, a hybrid genetic algorithm is used to slove the problem of partners selection in Virtual Enterprise...
To solve the non-uniformity problem of multi Time Delay Integral Charge Couple Device (TDICCD) mosaic camera, a non-uniformity correction algorithm is proposed and implemented on Field-Programmable Gate Array (FPGA) platform. Firstly, the generation and definition of non-uniformity are introduced; several common non-uniformity correction methods are discussed. Secondly, the correction algorithm is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.