This paper introduces the concept of fuzzy set and proposes a fitzzy cerehellar model for robotic manipulator control by combining the cerebellar model with the fuzzy theory. This model introduces the membership degre...
详细信息
ISBN:
(纸本)9781538612446
This paper introduces the concept of fuzzy set and proposes a fitzzy cerehellar model for robotic manipulator control by combining the cerebellar model with the fuzzy theory. This model introduces the membership degree of fuzzy set into the input layer of cerehellar model to reflect the objective world more accurately. It can not only move the ann along a specific path like a bionic cerebellar model, but also have higher integrity. The corresponding simulation experiments are carried out using the MATLAB platform and the experimental results show that the new model can control the arm exactly like the cognitive cerebellar model after several studies, and has higher control accuracy.
Standalone photovoltaic powered water pumping systems (SPVWSS) have been broadly used for irrigation, agriculture, water transport and water treatment applications. They have been receiving enhanced attention for tech...
详细信息
ISBN:
(纸本)9781538641637
Standalone photovoltaic powered water pumping systems (SPVWSS) have been broadly used for irrigation, agriculture, water transport and water treatment applications. They have been receiving enhanced attention for technical upgrade to further improve their performances. Design engineers have found innovative ways to improve both the PV generator's maximum power point tracking (MPPT) and the motor pumping apparatus best efficiency point tracking (BEPT) speed and ***, while designing, they have failed to consider subsystems composing the pumping scheme as interconnected and interdependent ones. In this regards, they only improved MPPT performances with total disregards of pump's BEPT optimal operating points and vice versa. In this paper, two independent control loops were separately implemented, namely, the pump mapping algorithm BEPT and PV generator fuzzy logic incremental conductance particular swarm optimization (FL-IC-PSO) MPPT algorithm. It was found that when the BEPT control loop is activated, the system is operating away from the PV generator's MPP, while when the MPPT control loop is activated, the power drawn from the PV generator is either higher or lower than that required by the motor pump set up to be operating in the vicinity of the pump's best efficiency region (BER). Findings observed in this paper laydown blueprint of next generation efficient SPVWSS to be characterised by maximum PV generated power utilization, maximum pumping efficiency and long term safe operation.
Due to budget constraints public transportation (PT) can no longer be deployed in regions where it attracts insufficient customers. Novel techniques like demand-responsive collective transportation (DRT) are evaluated...
详细信息
Due to budget constraints public transportation (PT) can no longer be deployed in regions where it attracts insufficient customers. Novel techniques like demand-responsive collective transportation (DRT) are evaluated to cut costs. This requires detailed simulations that are able to predict travel demand and include trip execution. Simulating facilities acting as feeder services to time-table based PT services requires detailed and accurate information about the PT infrastructure on a network. However, there are no public data sources that combine network and PT infrastructure data with the preferred level of detail. A newly developed bus stop mapping technique is presented. It uses the OpenStreetMap (OSM) and General Transit Feed Specification (GTFS) open data sources, which are maintained independently. Merging the data into a single database requires alignment. Developing bus stop mapping algorithms is challenging due to (i) inaccurate location data, (ii) inconsistent data sources and (iii) the vastly interconnected PT network and services. Due to the inaccuracy in the GTFS stop locations and in the OSM network, pure geometric considerations might lead to multiple candidate solutions to map a stop to the network. The new technique handles all GTFS trips at once and operates under the assumption that PT operators minimize the total distance driven to complete all trips. (C) 2017 The Authors. Published by Elsevier B.V.
With the aggressive scaling of submicron technology, intermittent faults are becoming one of the limiting factors in achieving a high reliability in Network-on-Chip (NoC). Increasing test frequency is necessary to det...
详细信息
ISBN:
(纸本)9781509006021
With the aggressive scaling of submicron technology, intermittent faults are becoming one of the limiting factors in achieving a high reliability in Network-on-Chip (NoC). Increasing test frequency is necessary to detect intermittent faults, which in turn interrupts the execution of applications. On the other hand, the main goal of traditional mapping algorithms is to allocate applications to the NoC platform, ignoring about the test requirement. In this paper, we propose a novel testing-aware mapping algorithm (TAMA) for NoC, targeting intermittent faults on the paths between crossbars. In this approach, the idle links are identified and the components between two crossbars are tested when the application is mapped to the platform. The components can be tested if there is enough time from when the application leaves the platform and a new application enters it. The mapping algorithm is tuned to give a higher priority to the tested paths in the next application mapping. This leaves enough time to test the links and the belonging components that have not been tested in the expected time. Experiment results show that the proposed testing-aware mapping algorithm leads to a significant improvement over FF, NN, CoNA, and WeNA.
An effective run-time application mapping algorithm needs to reduce network congestion due to its significant impact on network performance. In this paper, we propose a lightweight congestion evaluation metric for app...
详细信息
ISBN:
(纸本)9781509032198
An effective run-time application mapping algorithm needs to reduce network congestion due to its significant impact on network performance. In this paper, we propose a lightweight congestion evaluation metric for application mapping algorithms in NoC-based MPSoC. We obtain information from task graphs and the mapping results, and use it to calculate a congestion metric to evaluate the link interference for a given communication flow. The congestion metric is the number of flows which share the same link with the given flow, it reflects both internal and external congestion. The congestion metric is accurate and lightweight, it can be used in runtime application mapping algorithms and other real-time tasks. Simulation result shows a strong correlation between the metric value and the average latency. Compared with other similar metrics, our congestion metric shows much greater accuracy.
The advancement in process technology has enabled integration of different types of processing cores into a single chip towards creating heterogeneous Multiprocessor Systems-on-Chip (MPSoCs). While providing high leve...
详细信息
ISBN:
(纸本)9780769550749
The advancement in process technology has enabled integration of different types of processing cores into a single chip towards creating heterogeneous Multiprocessor Systems-on-Chip (MPSoCs). While providing high level of computation power to support complex applications, these modern systems also introduce novel challenges for system designers, like managing a huge number of mappings (application tasks to processing cores allocations) that increases exponentially with the number of cores and their types. This paper presents a mapping approach that computes multiple energy-throughput trade-off points (mappings) at design-time and uses one of these points at run-time based on desired throughput and current resource availability while optimizing for the overall energy consumption. While significantly reducing the complexity of the design space exploration (DSE) to compute mappings at design-time, the proposed strategy still evaluates mappings for all the resource combinations of the platform, providing efficient mapping solutions for all the scenarios of system architecture at run-time. Moreover, the proposed approach performs energy-aware mapping at run-time while utilizing the DSE results. Experimental results show that proposed strategy achieves better energy-throughput trade-off points, covers all the resource combinations and reduces energy consumption up to 24.93% at design-time and additionally 17.8% at run-time when compared to state-of-the-art techniques.
This paper presents kinematic analysis of a vertical type 6 DOF reticle stage for lithography process and a novel mapping method using a ratio of input-output relationship. The vertical type reticle stage system was d...
详细信息
ISBN:
(纸本)9781424426928
This paper presents kinematic analysis of a vertical type 6 DOF reticle stage for lithography process and a novel mapping method using a ratio of input-output relationship. The vertical type reticle stage system was designed for installing masks in photo-lithography process, and controlled using six precise gap sensors. As the stage is directly actuated by voice coil motors(VCM) and supported by plate springs, it has no mechanical contact or bearings those make mechanical wear and hysteresis effect in nano-level actuating. Meanwhile, the stage has cross coupled kinematics between each axes, so in this paper, the forward and inverse kinematics were solved to get an accurate reference position. In addition, a novel mapping method that reduces overall error using a ratio between command and output is proposed. The proposed mapping method needs only one measurement process to get the equal accuracy that obtained by two or three times measurement iterations in conventional mapping process. The mapping process was modeled and analyzed by input-output relation named as gamma ratio in this paper.
Attack graphs compute potential attack paths from a system configuration and known vulnerabilities of a system. Evidence graphs model intrusion evidence and dependencies among them. In this paper, we show how to map e...
详细信息
ISBN:
(纸本)9781467322850;9781467322867
Attack graphs compute potential attack paths from a system configuration and known vulnerabilities of a system. Evidence graphs model intrusion evidence and dependencies among them. In this paper, we show how to map evidence graphs to attack graphs. This mapping is useful for application of attack graphs and evidence graphs for forensic analysis. In addition to helping to refine attack graphs by using known sets of dependent attack evidence, important probabilistic information contained in evidence graphs can be used to compute or refine potential attack success probabilities obtained from repositories like CVSS. Conversely, attack graphs can be used to add missing evidence or remove irrelevant evidence trails to build a complete evidence graph. We illustrated the mapping by using a database attack as a case study.
Federated cloud facilitates data sharing across multiple organizations. Existing distributed storage systems cannot support efficient data search with complicated query requirements. This paper proposes a DS-index sol...
详细信息
ISBN:
(纸本)9781509033157
Federated cloud facilitates data sharing across multiple organizations. Existing distributed storage systems cannot support efficient data search with complicated query requirements. This paper proposes a DS-index solution to provide distributed search in federated cloud, targeting to support multi-attribute range search with secondary index. DS-index includes a three-layer architecture with a multi-attribute index overlay, a tree-based P2P network layer, and a federated cloud layer. In addition, a dynamic mapping algorithm has been presented for DS-index to map between different layers. We have also defined a Markov Chain-based cost model to facilitate node selection and mapping. The proposed DS-index solution is capable to support multi-attribute range queries in the federated cloud. The experiments have shown that, the DS-index solution with cost model can save the computation resource and reduce network bandwidth consumption by around 30% comparing to the one without cost model. It can also reduce the splitting/merging times by around 20% comparing to the state-of-the-art solution.
This paper presents a new efficient parallel implementation of multi-layer perceptron on mesh-connected SIMD machines. A new algorithm to implement the recall and training phases of the multi-layer perceptron network ...
详细信息
ISBN:
(纸本)0780374487
This paper presents a new efficient parallel implementation of multi-layer perceptron on mesh-connected SIMD machines. A new algorithm to implement the recall and training phases of the multi-layer perceptron network with back-error propagation is devised. The developed algorithm is much faster than other known algorithms of its class and comparable in speed to more complex architecture such as hypercube without the added cost;it requires O(1) multiplications and O(logN) additions, whereas most others require O(N) multiplications and O(N) additions. The proposed algorithm maximizes parallelism by unfolding the ANN computation to its smallest computational primitives and processes these primitives in parallel.
暂无评论