The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Our undergraduate curriculum includes a one semester course on object-oriented programming in the C# language and the .NET platform. The course underwent a major change in its labs organization two years ago - an introduction of regular one-week lab assignments motivated by a need to enhance unsatisfactory skills of students attending the course. However such change of the course scheme would not...
We consider the problem of communication avoidance in computing interactions between a set of particles in scenarios with and without a cutoff radius for interaction. Our strategy, which we show to be optimal in communication, divides the work in the iteration space rather than simply dividing the particles over processors, so more than one processor may be responsible for computing updates to a single...
The swarm behaviors of multi agent is a popular topic and has significant interest and application in industrial engineering, such as multi-robot team and autonomous air vehicle. Many studies have been done on modeling and describing swarm aggregation as well as analyzing its stability properties. This study provides a novel contribution by using Fuzzy Logic and simple Mamdani rules for constructing...
We present a design algorithm that minimizes the variation in performance by optimizing the design parameters of micro electro mechanical systems (MEMS). Due to variations from causes such as fabrication processing, packaging, actuation signals, and external disturbances, the true performance can be greater than 100% different than what may be predicted. Given the range and uncertainties of the design...
The aim of term semantic orientation analysis is to mine the sentiment polarity of words and phrases from their contexts. This paper presents a novel algorithm called Affinity Propagation to analyze semantic orientations of terms. Specifically, we build an informative graph from text corpus using an efficient Word Activation Force model and regard each term as a node in the graph. Then we propagate...
This paper presents flocking control algorithm for a group of Autonomous Underwater Vehicles (AUVs). A leader-follower flocking where, some AUVs are chosen as leaders which have global knowledge of desired track and other AUVs are chosen as followers which have only sensory capability to find the positions of neighbor AUVs without any global knowledge of desired path. The leader AUVs are desired to...
The performance of direct force control approaches for robotic tasks depends on the accuracy of environment model parameters. A mismatch between real and nominal environment parameters degrades the system response, being a critical problem for precise contact tasks. Adaptive control can tackle this problem based on online contact parameters estimation. In this paper, we develop an algorithm for online...
Flocking algorithms for a multi-agent system are distributed algorithms that only have simple rules for each agent but generate complex formational movement. These algorithms are known as swarm intelligence and are robust and disaster tolerant for most cases. On the other hand, most of organizations are constructed from smaller groups, we call it subgroup here. It means activities of organization...
Molecular dynamics (MD) simulations are useful in various areas. In this paper, we parallelize and optimize the grid-based MD algorithm on Many Integrated Core (MIC) Architecture. To get full play of the hardware and accelerate computation of MD simulation, we design the parallel structure using multi-threads with OpenMP. Also, various or method such as Array Notification, intrinsic and so on are...
Because of increasing vulnerabilities, maturing attack tools, and increasing dependence on computer network infrastructure, tools to support network defenders are essential. Course-of-action recommendation research has often assumed a goal of perfect network security. In reality, network administrators balance security with usability and so tolerate vulnerabilities and imperfect security. We provide...
As an entry for the 2012 Gordon-Bell performance prize, we report performance results of astrophysical N-body simulations of one trillion particles performed on the full system of K computer. This is the first gravitational trillion-body simulation in the world. We describe the scientific motivation, the numerical algorithm, the parallelization strategy, and the performance analysis. Unlike many previous...
In this paper a new electromagnetism-like mechanism is proposed for combinatorial optimization of capacitated vehicle routing problem. electromagnetism-like mechanism is a new metaheuristic method and inspired by the attraction and repulsion mechanism of the electromagnetism theory. we propose a new electromagnetism-like mechanism that it includes a new distance measure between solutions and new effective...
The shortage of original AES key generation and expansion strategy was researched. Based on these researches, the new AES key generation and expansion algorithms are proposed. In these algorithms, two-dimensional Logistic mapping is used to reduce the dependence between sub-keys. Experimental result shows that the security and robustness of the AES sub-keys have been strengthened.
Swarm robots provide greater flexibility and robust performance in tasks such as sensing and monitoring of unstructured and unpredictable environments. They need to self-deploy in these environments maximizing coverage and maintaining network connectivity for efficient operation. Inspired from nature, we design a new algorithm based on simple local rules, which achieves coverage and connectivity as...
With the rapid development of sensor and communication technology, wireless sensor networks (WSNs) have become a new emerging type of real-world applications. With the escalating exploration missions, two-dimensional(2D) WSNs can not meet demand. Therefore, we present an accurate coverage of complex target algorithm in three-dimensional(3D)mobile sensor network in this paper. The algorithm is a mobile...
Based on analyzing vehicle path planning space representation, polygon is used for expressing obstacles. Geometry Algorithm is introduced for path planning. Although the final path is not the best route, it is accordance with human vision. Simulation result proves that the algorithm has better practicability.
We explore setting bounds on part tolerances based on an adaptive Cloud-based algorithm to estimate lower bounds on achieving force closure during grasping. We consider the most common robot gripper: a pair of thin parallel jaws, and a conservative class of push-grasps allowing slip that can enhance part alignment for parts that can be modeled as extruded polygons. The grasp analysis algorithm takes...
This work proposes an algorithm for designing a simple End Effector configuration for a robotic arm which is able to grasp a given set of objects. The algorithm searches for a common 3-finger grasp over a set of objects. The search algorithm maps all possible grasps for each object which satisfy a quality criterion and takes into account an external wrench (force and torque) applied to the object...
Most of the layout algorithms for clustered graphs have been designed to differentiate the groups within the graph, however they do not take into account the interactions between such groups. Identifying these interactions allows to understand how the different communities exchange messages or information, and allows the social network researcher to identify key actors, social roles and paths from...
The ability of robots to promptly avoid obstacles and reach a goal while accurately maintaining a formation is extremely important for many swarm robotic tasks such as terrain analysis, search and rescue, and chemical plume source tracing. In prior work, using simulation, we established how Physicomimetics can be used to maintain swarms of mobile robots in formations that move towards a goal through...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.