We describe a snapshot of an adaptive charging network (ACN) for electric vehicles at Caltech. We overview the system design, from the power distribution system to advanced charger design to control and communication ...
详细信息
ISBN:
(纸本)9781509045464
We describe a snapshot of an adaptive charging network (ACN) for electric vehicles at Caltech. We overview the system design, from the power distribution system to advanced charger design to control and communication system and the software system that integrates the overall network. We present a simple mathematical formulation of the charging problem. We have collected three months' of baseline charging data from the Caltech ACN. We demonstrate, by simulating a charging algorithm on the baseline data, the large potential benefit of ACN in saving infrastructure costs.
Computing shortest distances is a central task in many graph applications. Although many algorithms to solve this problem have been proposed, they are designed to work in the main memory and/or with static graphs, whi...
详细信息
ISBN:
(纸本)9781509028474
Computing shortest distances is a central task in many graph applications. Although many algorithms to solve this problem have been proposed, they are designed to work in the main memory and/or with static graphs, which limits their applicability to many current applications where graphs are subject to frequent updates. In this paper, we propose novel efficient incremental algorithms for maintaining all-pairs shortest distances in dynamic graphs. We experimentally evaluate our approach on real-world datasets, showing that it outperforms current algorithms designed for the same problem.
This paper presents a method for analyzing patterns of criminal activity that occur in space and time. The method uses the fuzzy C-means algorithm to cluster criminal events in space. In addition, a cluster reorganiza...
详细信息
ISBN:
(纸本)9781509006274
This paper presents a method for analyzing patterns of criminal activity that occur in space and time. The method uses the fuzzy C-means algorithm to cluster criminal events in space. In addition, a cluster reorganization algorithm is included to preserve the order of fuzzy partitions from one time step analysis to another. Order preservation is possible since crime forms relatively stable patterns due to the fixed shape of urban spaces and routine activities of people. The method provides a novel way to analyze criminal directionality, since it generates time series from clustering. A sample database of robberies in San Francisco, USA, is used to test the algorithm. Results show that criminal patterns might be tracked in a simple way.
In this paper, a novel algorithm is presented for the design of sparse linear-phase FIR filters. Compared to traditional l 1 -optimization-based methods, the proposed algorithm minimizes l 1 norm of a portion (instea...
详细信息
In this paper, a novel algorithm is presented for the design of sparse linear-phase FIR filters. Compared to traditional l 1 -optimization-based methods, the proposed algorithm minimizes l 1 norm of a portion (instead of all) of nonzero coefficients. In this way, some nonzero coefficients at crucial positions are not affected by l 1 norm utilized in the objective function. The proposed algorithm employs an iterative procedure and the index set of these crucial coefficients is updated in each iteration. Simulation results demonstrate that the proposed algorithm can achieve better design results than both greedy methods and traditional l 1 -optimization-based methods.
Multiple patterning lithography has been widely adopted for today's circuit manufacturing. However, increasing the number of masks will make the manufacturing process more expensive. More importantly, towards 7 nm...
详细信息
ISBN:
(纸本)9781467395700
Multiple patterning lithography has been widely adopted for today's circuit manufacturing. However, increasing the number of masks will make the manufacturing process more expensive. More importantly, towards 7 nm technology node, the accumulated overlay in multiple patterning will cause unacceptable edge placement error (EPE). Recently, directed self-assembly (DSA) has been shown to be an effective lithography technology that can pattern contact/via/cuts with high throughput and low cost. DSA is currently aiming at 7 nm technology, where the guiding template generation needs either double patterning EUV or multiple patterning DUV process. By incorporating DSA into the multiple patterning process, it is possible to reduce the number of masks and achieve a cost effective solution. In this paper, we study the decomposition problem for contact layer in row-based standard cell layout with DSA-MP complementary lithography. We explore several heuristic-based approaches, and propose an algorithm that decomposes a standard cell row optimally in polynomial-time. Our experiments show that our algorithm guarantees to find a minimum cost solution if one exists, while the heuristic cannot or only finds a sub-optimal solution. Our results show that the DSA-MP complementary approach is very promising for the future advanced nodes.
Assuring security (in the form of attacking mode as well as in safeguard mode) and at the same time keeping strong eye on the opposition's status (position, quantity, availability) is the key responsibility of a c...
详细信息
Assuring security (in the form of attacking mode as well as in safeguard mode) and at the same time keeping strong eye on the opposition's status (position, quantity, availability) is the key responsibility of a commander in the battlefield. Battlefield surveillance is one of the strong applications of Wireless Sensor Networks (WSNs). A commander is not only liable to his above responsibilities, but also to manage his duties in an efficient way. For this reason, ensuring maximum destruction with minimum resources is a major concern of a commander in the battlefield. This paper focuses on the maximum destruction problem in military affairs. In the work of Jaigirdar and Islam (2012), the authors proposed two novel algorithms (Maximum degree analysis and Maximum clique analysis) that ensure the efficiency and cost-effectiveness of the above problem. A comparative study explaining the number of resources required for commencing required level of destruction made to the opponents has been provided in the paper. In this paper the authors have come forward with another algorithm for the same problem. With the simulation studies and comparative analysis of the same example set the authors in this paper demonstrate the effectiveness (in both the quality and quantity) of the new method to be best among the three.
Numerous niching algorithms have been developed to find multiple optima for multimodal optimisation problems. analysis of niching algorithms presents a problem due to the multiple objectives of niching algorithms, tha...
详细信息
Numerous niching algorithms have been developed to find multiple optima for multimodal optimisation problems. analysis of niching algorithms presents a problem due to the multiple objectives of niching algorithms, that is, to find as many optima as possible, to find accurate solutions, and to find a diverse set of solutions. Performance analysis becomes more difficult when no knowledge of the fitness landscape is available. This is due to the assumption of most performance measures that information about the optima is available. This paper provides a critical review of existing performance measures for niching algorithms. In addition, the paper introduces a new approach, the mid-point technique, to determine a unique set of solutions for performance measurement. The performance measures are used to evaluate the performance of seven particle swarm optimisation niching algorithms. The obtained results are then used to compute the predictive capability of non-knowledge assuming performance measures to that of knowledge assuming measures. The analysis shows that the considered performance measures do show a convergent behaviour.
With the emergence of swarm intelligence and evolutionary algorithms, system designers are creating robotic swarms of continuously increasing sizes. As the size of a swarm increases, it is imperative to have a uniform...
详细信息
ISBN:
(纸本)9781467399869
With the emergence of swarm intelligence and evolutionary algorithms, system designers are creating robotic swarms of continuously increasing sizes. As the size of a swarm increases, it is imperative to have a uniform program collectively downloaded on all the agents in it. These uniform programs impede the designer's ability to designate distinct identities for various agents in the swarm. In this work we propose an algorithm that, when implemented in a robotic swarm, allows the locally interacting agents to autonomously designate unique identifications to each other at run time. The results show that when used on a small swarm of autonomous robots, running the algorithm led to a steady state where every agent in a local neighborhood was assigned a unique identification value.
We propose a new concept of minmax memory claim (MMC) to achieve cost-effective workflow computations in in-memory cloud computing environments. The minmax-memory claim is defined as the minimum amount of memory requi...
详细信息
We propose a new concept of minmax memory claim (MMC) to achieve cost-effective workflow computations in in-memory cloud computing environments. The minmax-memory claim is defined as the minimum amount of memory required to finish the workflow without compromising its maximum concurrency. With MMC, the workflow tenants can achieve the best performance via the maximum concurrency while minimizing the cost to use the memory resources. In this paper, we present the algorithms to find the MMC for workflow computation and evaluate its value by applying it to deadlock avoidance algorithms.
This paper presents the singularity analysis of a novel endoscopic surgical parallel manipulator. The 4-DOF, 2- PUU_2-PUS, surgical robot design has larger bending angles and workspace volume. All previous manipulator...
详细信息
ISBN:
(纸本)9781509025367
This paper presents the singularity analysis of a novel endoscopic surgical parallel manipulator. The 4-DOF, 2- PUU_2-PUS, surgical robot design has larger bending angles and workspace volume. All previous manipulators have a zero pitch and infinity pitch reciprocal screws, so it is easy to find out the singular configurations inside the workspace. On the other hand, the novel 4-DOF surgical robot (2-PUU_2-PUS) has h-pitch reciprocal screws. The known geometrical approach for reciprocal-screws could not provide all singular configurations of the novel manipulator. Geometrical/Analytical approach for reciprocal-screws based singularity analysis of 2-PUU_2-PUS is proposed. The proposed algorithm can find all singular configurations of any limited DOF parallel manipulator with h-pitch reciprocal screws. The results show the feasibility of the proposed algorithm to find all singular configurations of the 4-DOF parallel manipulator. The discovered singularity configurations shrieked greatly the singularity free workspace to one fourth the original workspace. In order to be able to work through the entire workspace, we suggest changing the topology structure of the manipulator.
暂无评论