This paper is based on a dynamic replication control strategy for minimizing communications costs. In dynamic environments where the access pattern to share resources cannot be predicted statically, it is required to ...
详细信息
This paper is based on a dynamic replication control strategy for minimizing communications costs. In dynamic environments where the access pattern to share resources cannot be predicted statically, it is required to monitor such parameter during the whole lifetime of the system so as to adapt it to new requirements. The shared-object management system is implemented in a centralized manner in which a master processor deals with the serialization of invocations. On one hand, we attempt to provide fault tolerance as a way to adjust the system parameters to work only with a set of correct processors so as to enhance system functionality. On the other hand, we attempt to furnish availability by masking the failure of the master processor. A new master processor is elected that resumes the master processor processing. Our shared-object management system modularity is realized through a meta level implementation.
Speech-to-text systems work as an interpreter today. Since each domain has its own terminology and constraints, its effectiveness depends on the language's capacity to comprehend grammar, spot patterns, and relate...
详细信息
Speech-to-text systems work as an interpreter today. Since each domain has its own terminology and constraints, its effectiveness depends on the language's capacity to comprehend grammar, spot patterns, and relate to the intended domain frequently. The primary aspect units in audio-to-text conversion are complete sentences or phraseological units that explain the overall idea of the process rather than a single word.
This research gives the impending supremacy of P2P Botnet to educated guess its belongings on the networks and hosts once it perform malicious operations. Uninflected the Botnet traffic from regular traffic makes shar...
详细信息
ISBN:
(纸本)9781509006137
This research gives the impending supremacy of P2P Botnet to educated guess its belongings on the networks and hosts once it perform malicious operations. Uninflected the Botnet traffic from regular traffic makes sharing of the info doable. It uses Address anonymization will be done by Apriori conserving Anonymization algorithmic program to regulate the attack of P2P Botnet. The on top of a technique for anonymizing has several edges. Apriori Anonymization algorithm could be a cryptography sanitation algorithmic program for network trace house owners to anonymize the information science addresses of P2P Botnet and their traces in an exceedingly prefix preserving manner as a software Define Type (SDT).
In this paper, an efficient Euclidean decoding algorithm is presented to solve the Berlekamp's key equation of Reed-Solomon (RS) code for correcting erasures as well as errors by replacing the initial condition of...
详细信息
In this paper, an efficient Euclidean decoding algorithm is presented to solve the Berlekamp's key equation of Reed-Solomon (RS) code for correcting erasures as well as errors by replacing the initial condition of the Euclidean algorithm with the erasure locator polynomial and the Forney syndrome polynomial. By this proposed algorithm, the errata locator polynomial and errata evaluator polynomial can be obtained simultaneously without the computations of polynomial division and field element inversion. Moreover, the whole recursive decoding produce for solving Berlekamp's key equation could be performed with a fixed number of iterations. And, the weights used to reduce the degree of the errata evaluator polynomial at each iteration can be extracted from the coefficient of fixed degree. As a consequence, the complexity of RS decoder to correct both errors and erasures is reduced substantially. Therefore, this proposed algorithm provides more modular, regular and simple for both software and hardware implementation. An example using this proposed algorithm is given for a (255,239) RS code for correcting erasures and errors with s + 2v /spl les/ 16.
This paper defined a kind of multi-dimension data cube model, and presented a new formalization of generalized association rule based on data cube model. After comprehending the weaknesses of the current generalized a...
详细信息
This paper defined a kind of multi-dimension data cube model, and presented a new formalization of generalized association rule based on data cube model. After comprehending the weaknesses of the current generalized association rule mining algorithms based on data cube, we proposed a new algorithm GenHibFreq which was suitable for mining multi-level frequent item set based on data cube. By taking advantage of the item taxonomy, algorithm GenHibFreq reduced the number of candidate itemsets counted, and had better efficiency. We also designed an algorithm GenerateLHSs-Rule for generating generalized association rule from multi-level frequent item set. Demonstrated through examples, algorithms proposed in this paper had better efficiency and less generated redundant rules than several existing mining algorithms, such as Cumulate, Stratify and ML_T2L1, and had good performance inflexibility, scalability and complexity and had new ideas on conducting the generalized association rule mining algorithms in multi-dimension environment and it also has great theoretical meaning and practical value.
The air data system measures and provides vital information like an aircraft's speed, altitude, and other safety parameters essential for flight. Errors in such critical system components result in loss of control...
详细信息
ISBN:
(数字)9798350350654
ISBN:
(纸本)9798350350661
The air data system measures and provides vital information like an aircraft's speed, altitude, and other safety parameters essential for flight. Errors in such critical system components result in loss of control of the aircraft, leading to aircraft crashes. Thus, redundancy for this critical component is highly important. The proposed work introduces a new method for identifying problems with the air data sensor in an airplane. Current techniques involve a complicated voting system that requires multiple sensors to function properly. However, this new approach uses analytic redundancy to monitor the sensor's performance continuously, which is more desirable than relying on air data probe measurements. The method involves using a mathematical model that considers only the inertial measurement unit and navigation system data to estimate air data and detect faults in the sensors. The robust three-stage unscented Kalman filter is used to provide an accurate estimation. By comparing the estimated data with the physical measurements, the algorithm can track the performance of each sensor and identify any faults. The algorithm is tested in X-Plane software and validated using real-time data from a Cessna Citation II transport aircraft. A sensor stuck fault was introduced twice in the 60-second run time. The UKF outperformed the novel EKF in most of the cases and showed its robustness during various fault conditions with a 1–2 % deviation in RMSE values. The results obtained showed that the estimated data can be used as a replacement for a redundant sensor, reducing the complexity and cost of these sensors.
Multi-core computers have become increasingly popular, in order to improve the performance of index in database systems on multi-core computers, and this paper presents an alternative algorithm of linear hashing and m...
详细信息
Multi-core computers have become increasingly popular, in order to improve the performance of index in database systems on multi-core computers, and this paper presents an alternative algorithm of linear hashing and multithreaded disk buffer on multi-core computers. In this algorithm, records can be inserted into hash table concurrently by different threads. The key of the parallel insertion is to make traditional insertion into batch insertion. Multithreaded disk buffer is developed for multithreaded linear hashing, making multithreads allocate and release memory simultaneously as much as possible. It is applied to maximize memory utilization and to minimize the number of disk accesses. Our experimental result shows that, compared to traditional serial linear hashing, multithread linear hashing achieves a higher performance on multi-core computers.
To meet the needs of monitoring the indoor environment, a mobile robot that patrols indoors is designed. The mobile robot uses Raspberry Pi equipped with a ROS system as the control core, uses lidar to collect environ...
详细信息
ISBN:
(纸本)9781665406932
To meet the needs of monitoring the indoor environment, a mobile robot that patrols indoors is designed. The mobile robot uses Raspberry Pi equipped with a ROS system as the control core, uses lidar to collect environmental information, and uses various function packages to develop algorithms under the ROS distributed framework. It is based on the Karto algorithm to build maps and uses the A* algorithm and DWA algorithm to realize autonomous navigation. The robot uses a two-wheel independent drive robot chassis to cope with the complex environment. After the indoor environment test, the goal of indoor map construction and path planning can be completed, which is of great significance to the research in the indoor environment in the future.
In this paper, the equivalent electronic LS coupled atomic state is simulated by Matlab in parallel calculation, and a series of zero field-ultra low field atomic states of different LS coupled chemical molecular samp...
详细信息
ISBN:
(数字)9781728183046
ISBN:
(纸本)9781728194608
In this paper, the equivalent electronic LS coupled atomic state is simulated by Matlab in parallel calculation, and a series of zero field-ultra low field atomic states of different LS coupled chemical molecular samples are obtained. Combined with the method, the analytical solution of the time optimal control of any single spin rotation of the two-spin system under zero field conditions is obtained, and the optimal control operation is achieved on the built experimental platform, with an average fidelity of 99 %. Compared with the previous single-core computing, the optimal control of multicore parallel computing can save 70-80% of the time. This work has a certain guiding role for Matlab parallel computing simulation.
暂无评论