Most of cryptographic systems are based on modular exponentiation. It is performed using successive modular multiplications. One way of improving the throughput of a cryptographic system implementation is reducing the...
详细信息
the considerable computation time of a practical application of sequential algorithms for simulating thermal and flow distribution in pipe networks is the motivating factor to study their parallel implementation the m...
详细信息
ISBN:
(纸本)9783642144028
the considerable computation time of a practical application of sequential algorithms for simulating thermal and flow distribution in pipe networks is the motivating factor to study their parallel implementation the mathematical model formulated and studied in the paper requires the solution of a set of nonlinear equations, which are solved by the Newton-Raphson method An object-oriented solver automatically formulates the equations for networks of an arbitrary topology the hydraulic model that is chosen as a benchmark consists of nodal flows and loop equations A general decomposition algorithm for analysis of flow and temperature distribution in a pipe network is presented, and results of speedup of its parallel implementation are demonstrated
Wireless communication standards are developed at an ever-increasing rate of pace, and significant amounts of effort is put into research for new communication methods and concepts. On the physical layer, such topics ...
详细信息
ISBN:
(纸本)9781424458868
Wireless communication standards are developed at an ever-increasing rate of pace, and significant amounts of effort is put into research for new communication methods and concepts. On the physical layer, such topics include MIMO, cooperative communication, and error control coding, whereas research on the medium access layer includes link control, network topology, and cognitive radio. At the same time, implementations are moving from traditional fixed hardware architectures towards software, allowing more efficient development. Today, field-programmable gate arrays (FPGAs) and regular desktop computers are fast enough to handle complete baseband processing chains, and there are several platforms, both open-source and commercial, providing such solutions. the aims of this paper is to give an overview of five of the available platforms and their characteristics, and compare the features and performance measures of the different systems.
In this paper we used a generalized net which gives a possibility for parallel optimization of multilayer neural networks. For training the backpropagation algorithm with momentum was considered. We proposed a general...
详细信息
In this paper we used a generalized net which gives a possibility for parallel optimization of multilayer neural networks. For training the backpropagation algorithm with momentum was considered. We proposed a generalized net model of parallel training of two neural networks with different architectures. the difference between the networks is in the number of neurons in main difference of the neural networks architectures is the numbers of neurons in hidden layers. In result we can obtain optimal neural network architecture.
An approach to carrying out asynchronous distributed simulation of multiprocessor message passing architectures is presented. Aiming at achieving better performance on Conservative DEVS-based simulations, we introduce...
详细信息
ISBN:
(纸本)9780769542515
An approach to carrying out asynchronous distributed simulation of multiprocessor message passing architectures is presented. Aiming at achieving better performance on Conservative DEVS-based simulations, we introduce the GLM protocol which borrows the idea of safe processing intervals from the conservative time window algorithm and maintains global synchronization in a fashion similar to the distributed snapshot technique. Under the GLM scheme, a central lookahead manager (LM) exists which is in charge of receiving every LP's lookahead, identifying the global minimum lookahead of the system, and broadcasting it via null messages to all LPs. the simulation is divided into cycles of two phases: parallel phase and Broadcast phase. the GLM protocol is asynchronous and the central lookahead manager is not expected to be a bottleneck since the only message transmissions involving it take place when all LPs are blocked waiting for permission to advance their LVTs. the results presented in this paper show that the GLM protocol not only significantly reduces the total number of null messages, but it improves the performance and higher speedups are achieved.
Fuel assemblies are very expensive parts of the nuclear reactor. Initially they were used in Hungary for 3 years, now for 4 years and soon they will stay in the core for 5 years. Each year only 1/3rd, 1/4th later 1/5t...
详细信息
ISBN:
(纸本)9780769540160
Fuel assemblies are very expensive parts of the nuclear reactor. Initially they were used in Hungary for 3 years, now for 4 years and soon they will stay in the core for 5 years. Each year only 1/3rd, 1/4th later 1/5th of them is replaced, therefore the change of the fuel type is a lengthy process, with mixed cores used. the authorities require that the staff should be trained to each particular core before they operate it. For this reason the simulator should be upgraded to simulate the exact behavior of each core foreseen for the next 5 years. the RETINA code (Reactor thermo-hydraulics Interactive) is a 3D offline code, developed in our department. KIKO3D - Neutron Kinetics 3D - has been developed in our Institute, too, in the Reactor Analysis Department. Both of them should be integrated into our full-scope replica simulator, coupled, and stressed to operate parallel in real-time, using four hi-power processors. the simulation-specific details are discussed in the paper.
this paper investigates semi-online scheduling problems on two parallel identical machines under a grade of service (GoS) provision. We consider two different semi-online versions where the optimal offline value of th...
详细信息
ISBN:
(纸本)9783642143540
this paper investigates semi-online scheduling problems on two parallel identical machines under a grade of service (GoS) provision. We consider two different semi-online versions where the optimal offline value of the instance is known in advance or the largest processing time of all jobs is known in advance. Respectively for two semi-online problems, we develop algorithms with competitive ratios of 3/2 and (root 5 + 1)/2, which are shown to be optimal.
QR (Quick Response) codes are frequently used with progress of the Internet and introducing the QR decoding function in the cellar phone. A bar code shows an individual identification number (ID) by this number fundam...
详细信息
Suffix array is one of the most important data structures in bioinformatics. Much effort has been devoted to find efficient sequential algorithms for its construction, but little is done to introduce parallel construc...
详细信息
Suffix array is one of the most important data structures in bioinformatics. Much effort has been devoted to find efficient sequential algorithms for its construction, but little is done to introduce parallel construction algorithms. the bucket pointer refinement algorithm is one of the efficient suffix sorting algorithmsthat is tuned for genomic datasets. In this paper, we introduce a parallel version of this algorithm running on (shared memory) multicore computers. We present experimental results comparing our algorithms to other parallelalgorithms running on similar architecture. Our program is open source and available at http://***. ***/tools/pbpr.
this paper presents an approach for predictive security analysis in a business process execution environment It is based on operational formal models and leverages process and threat analysis and simulation techniques...
详细信息
ISBN:
(纸本)9783642147050
this paper presents an approach for predictive security analysis in a business process execution environment It is based on operational formal models and leverages process and threat analysis and simulation techniques in order to be able to dynamically relate events from different processes and architectural layers and evaluate them with respect to security requirements Based on this, we present a blueprint of an architecture which can provide decision support by performing dynamic simulation and analysis while considering real-time process changes It allows for the identification of close-future security-threatening process states and will output a predictive alert for the corresponding violation
暂无评论