In system-level design using hardware-software co-design approaches, applications involved in embedded systems are usually represented as data flow diagrams (DFD) where nodes may either be implemented in software or i...
详细信息
ISBN:
(纸本)9781424438075
In system-level design using hardware-software co-design approaches, applications involved in embedded systems are usually represented as data flow diagrams (DFD) where nodes may either be implemented in software or in hardware, subject to cost-performance constraints. In our research paper, we present how genetic algorithms can be used in order to perform hardware-software partitioning of applications which graph nodes can be implemented in hardware as look-up tables (LUT). these applications are characterized by fixed communication delays and accurate cost predictions which help to reach cost-effective implementations. Results of the proposed approach applied on a 3D range measurement application are presented.
A new approach that combines neural network and 0-1 programming was proposed. Based on the lifecycle analysis, the characteristics of new products can be divided into four categories with different benefit curves and ...
详细信息
ISBN:
(纸本)9780878492992
A new approach that combines neural network and 0-1 programming was proposed. Based on the lifecycle analysis, the characteristics of new products can be divided into four categories with different benefit curves and parameters. A neural network is used to classify the new product and the 0-1 programming model is then developed and used to determine what products to be introduced into marketplace. Numerical example is given finally to show that this model is effective for firms.
A flexible remanufacturing system based on arc weld robot is established which consists of three subsystems: 3D laser measuring subsystem, modeling subsystem and off-line programming subsystem. the whole remanufacturi...
详细信息
ISBN:
(纸本)9780878492992
A flexible remanufacturing system based on arc weld robot is established which consists of three subsystems: 3D laser measuring subsystem, modeling subsystem and off-line programming subsystem. the whole remanufacturing procedure consists of a several steps, such as work piece measuring, locating, modeling, welding program generating and surface depositing. the surfacing program consists of automatic delamination, automatic weld bead planning and welding parameter generation. the system can be easily employed to an automatic remanufacturing of work piece of various state of surface damage. Test remanufacture are carried on damaged plate, damaged column and worn axletree, and the results show the system is feasible.
SLA driven service transaction has been identified as a key challenge to take advantage of a SOA. FAST System provides a software framework for the automated creation of SLAs. In particular it have been developed as a...
详细信息
ISBN:
(纸本)9783642103827
SLA driven service transaction has been identified as a key challenge to take advantage of a SOA. FAST System provides a software framework for the automated creation of SLAs. In particular it have been developed as an extension to the ESB (Enterprise Service Bus) paradigm to create a transparent SLA management layer that drives any service invocation. Our framework has been successfully applied in two different scenarios and provides an extensible architecture to address new domains.
In this paper, we introduce a computer-based method for menu planning, which applies evolutionary computation. First, we formalize the n-day menu-planning problem, decomposing it into several sub-problems at the daily...
详细信息
In this paper, we introduce a computer-based method for menu planning, which applies evolutionary computation. First, we formalize the n-day menu-planning problem, decomposing it into several sub-problems at the daily-menu and meal-planning level. We reduce the problem to a multi-dimensional knapsack problem. then, we define an evolutionary algorithm that quickly finds a diverse set of feasible solutions (i.e. optimal menus) withthe optimum objective functions' values, without examining all the possibilities. As the problem is constrained, infeasible solutions need to be repaired in order to direct the "evolution" towards the feasible regions. We present greedy repairing methods that slightly differ at the global level and the sub-problems' levels. At the meal-planning level, we couple repairing with linear programming to balance infeasible meals. We conclude the paper withthe presentation of empirical results, which showed that the evolutionary method may outperform a human. A computer was able to find the Pareto-optimal front of 21-day menus with respect to a dietary advice in equal or less time than a human professional, who designed a daily menu. However, the human factor is still important in the last stage, when a solution has to be selected from the Pareto front. (C) 2009 Elsevier Inc. All rights reserved.
the proceedings contain 10 papers. the topics discussed include: online selection of mediated and domain-specific predictions for improved recommender systems;using Gaussian spatial processes to model and predict inte...
the proceedings contain 10 papers. the topics discussed include: online selection of mediated and domain-specific predictions for improved recommender systems;using Gaussian spatial processes to model and predict interests in museum exhibits;optimal set recommendations based on regret;uncovering functional dependencies in MDD-compiled product catalogues;effectiveness of different recommender algorithms in the mobile Internet: a case study;adapting K-nearest neighbor for tag recommendation in folksonomies;analysis of web usage patterns in consideration of various contextual factors;exploiting semantic web technologies for recommender systems: a multi view recommendation engine;intelligent web navigation using virtual assistants;and collaborative filtering with adaptive information sources.
this paper describes an implementation of a new IEC 61499 execution environment based on the generic cyclic execution model, outlined within the draft IEC 61499 Compliance Profile for Execution models. the proposed mo...
详细信息
ISBN:
(纸本)9781424437597
this paper describes an implementation of a new IEC 61499 execution environment based on the generic cyclic execution model, outlined within the draft IEC 61499 Compliance Profile for Execution models. the proposed model further adds more details to the generic cyclic model via an abstract implementation independent way.
Norms and regulations play an important role in the governance of human society. Social rules Such as laws, conventions and contracts prescribe and regulate our behaviour, however it is possible for us to break these ...
详细信息
ISBN:
(纸本)9783642042379
Norms and regulations play an important role in the governance of human society. Social rules Such as laws, conventions and contracts prescribe and regulate our behaviour, however it is possible for us to break these rules at our discretion and face the consequences. By providing the means to describe and reason about norms in a computational context, normative frameworks may be applied to software systems allowing for automated reasoning about the consequences of socially acceptable and unacceptable behaviour. In this paper, we outline our mathematical formulation for normative frameworks and describe how its semantics can be represented in ASP. thus enabling the construction of models of normative systems that can be subjected to formal verification and that can act as functional repositories of normative knowledge for the software components that participate in them.
the perceptron problem (PP) appeared for the first time in the learning machines and is very useful for zero-knowledge identification schemes in cryptology. the problem is NP-complete and no deterministic algorithm is...
详细信息
the perceptron problem (PP) appeared for the first time in the learning machines and is very useful for zero-knowledge identification schemes in cryptology. the problem is NP-complete and no deterministic algorithm is known to date. In this paper we develop a deterministic method based on DC (Difference of Convex functions) programming and DCA (DC optimization Algorithms), an innovative approach in nonconvex programming framework. We first formulate the PP as a concave minimization programming problem. then, we show how to apply DC programming and DCA for the resulting problem. Numerical results demonstrate that the proposed algorithm is promising: its is very fast and can efficiently solve the Perceptron Problem with large sizes.
PCI Express is a modern, high-performance communication protocol implementing highly sophisticated features to meet today's performance demands. Although an off-chip protocol, PCI Express implements many principle...
详细信息
ISBN:
(纸本)9781424448067
PCI Express is a modern, high-performance communication protocol implementing highly sophisticated features to meet today's performance demands. Although an off-chip protocol, PCI Express implements many principles of future on-chip communication architectures. It is a highly complex protocol which is naturally hard to verify formally. We recently proposed a new methodology, based on a series of model transformation steps, to revise the traditional modelling and verification workflow for designing on-chip protocols. We present the application of the new approach to the PCI Express transaction layer. the work has been accomplished in the Isabelle/HOL theorem prover. By restricting the models to an executable subset of the specification language, we have been able to combine the advantages of specifying in a theorem prover withthe advantages of executable models in a functionalprogramming language.
暂无评论