The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to detect resource related faults in operating system, an approach based on path-insensitive analysis is proposed. The approach, which can detect a wider variety of resources issues, is context-sensitive. Test cases to identify errors are automatically generated. The models for the C code and resource related faults are set up. Furthermore a platform for resource faults detection is developed...
A little over a decade ago, Goto and van de Geijn wrote about the importance of the treatment of the translation lookaside buffer (TLB) on the performance of matrix multiplication. Crucially, they did not say how important, nor did they provide results that would allow the reader to make his own judgement. In this paper, we revisit their work and look at the effect on the performance of their algorithm...
In this paper, we demonstrate a new approach for power-consumption optimization using a dedicated Auto-tuning (AT) language. Our approach is based on recently developed technologies: (1) a power measurement application programming interface, (2) an AT mathematical core library. Preliminary performance evaluation enables us to select the best kernel for a real-world scientific program using either...
Image matching based on contour is an important issue in computer vision, navigation and pattern recognition. The image matching methods like curvature-based methods and corner-based methods have poor robustness to the contour's noise and distortion, and some matching methods are applied only to closed contours. A novel contour representation and matching algorithm, based on local curvature scale,...
In this work, we discuss a recently proposed approach for supervised dimensionality reduction, the Supervised Distance Preserving Projection (SDPP) and, we investigate its applicability to monitoring material's properties from spectroscopic observations using Local Linear Regression (LLR). An experimental evaluation is conducted to show the performance of the SDPP and LLR and compare it with a number...
In semiconductor fabrication processes, effective management of maintenance operations is fundamental to decrease costs associated with failures and downtime. Predictive Maintenance (PdM) approaches, based on statistical methods and historical data, are becoming popular for their predictive capabilities and low (potentially zero) added costs. We present here a PdM module based on Support Vector Machines...
A Python computer program for calculation of distortion in the wide-band diode bridge track and hold amplifier (THA) is proposed. The computer program calculates the distortion of weekly nonlinear THA based on the KCL and the nonlinear-current method with an improved process. Simulations based on a commercially available 130 nm process technology are performed with the SpectreRF simulator. Comparative...
This paper mainly discuss three kinds of optimization method to get the optimal penalty factor C and kernel parameter G of support vector regression. the mean square error MSE, correlation coefficient R, the number of support vector nsv was regarded as indexes to measure the merits of the various optimization prediction model, the experimental results shows that the prediction model based on genetic...
A novel strategy for online evaluation of analog circuit performance based on adaptive least squares support vector regression machine is proposed. Regarding reducing the computation, simultaneously, employing double kernel RBF to interfuse more flexibility to the kernel function online such as the bandwidths. And the design idea and constructed steps based on adaptive least square support vector...
In standard mean shift tracker (SMST), the object position can be well located, whereas its orientation cannot be determined. In this paper, a modified mean shift tracker is proposed to obtain the object position and orientation simultaneously. By defining the concepts of feature angle and position angle, a new object model is formulated, where the feature space, originally only containing the color...
We design polar codes for q-ary input, q = 2r, that polarize to an arbitrary given subset of extremal configurations out of the original triangular array of r +1 such configurations. We also obtain a new proof of the known result about 2-level polarization of q-ary codes.
A new sparse kernel density estimator is introduced. Our main contribution is to develop a recursive algorithm for the selection of significant kernels one at time using the minimum integrated square error (MISE) criterion for both kernel selection. The proposed approach is simple to implement and the associated computational cost is very low. Numerical examples are employed to demonstrate that the...
The battlefield damage level assessment is different from other assessment problems because of its characteristics such as small sample, multiple influence factors and high dimension. Thereby, the assessment methods like Bayesian Net (BN), Neutral Net (NN), and multiple indexes comprehensive method can't be used in this domain. So, a new method must be introduced. Then, Support Vector Mechanism (SVM)...
Motion deblur is a very hot and hard research topic currently because it is an ill-posed problem. In this paper, we proposed using normalized nonlinear diffusion regularization for motion deblurring. To reduce the complexity of solving the deblurring equation, a fast method called Split method is used. Because the result derived from the energy function give the lowest cost, our method doesn't need...
Nowadays, with the explosive growth of the network technologies many new applications and services have been developed on Internet. World Wide Web can provide these services provided without the limitation of time and location. Obviously, the number of user is dramatically increasing from amount of the visitations of web pages. In our previous work, we proposed an algorithm to discover more significant...
The concept of fuzzy numbers is a generalization of the concept of real numbers. Intuitively, there are more fuzzy numbers than real numbers, that is, the cardinality of the set consisting of all fuzzy numbers should not be smaller than the cardinality of the set of all real numbers. In this work, based on a newly established Decomposition Theorem IV for fuzzy sets, a one-to-one mapping from the set...
Autonomous Underwater Vehicles (AUVs) have found their application in exploration and surveillance. This paper proposes a cooperative distributed search algorithm based on a minimum entropy approach for AUVs with capabilities like multi agent exploration. The work is motivated by the project “Thesaurus”, whose among its own purposes has the survey of marine areas of archaeological interest in the...
This paper, which the particle swarm algorithm and simulated annealing algorithm is improved and fused, has formed the particle swarm annealing hybrid optimization algorithm. The performance of IPSSAO is evaluated by MATLAB and three typical functions are optimized with IPSSAO algorithm, PSO and ASPSO algorithm. The simulation results show that IPSSAO algorithm optimization effect is better than the...
The Linux kernel is one of the largest configurable open source software systems implementing static variability. In Linux, variability is scattered over three different artifacts: source code files, Kconfig files, and Makefiles. Previous work detected inconsistencies between these artifacts that led to anomalies in the intended variability of Linux. We call these variability anomalies. However, there...
Given the time limit, software engineering courses in universities can only emphasize a particular development approach or method; therefore, it is challenging to prepare graduates to face the diverse range of approaches and methods used by industry. One of the issues software engineering education faces is the lack of a framework to understand and compare the similarities and differences among diverse...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.