Traditional image object classification and detection algorithms and strategies cannot meet the problem of video image acquisition and processing. Deep learning deliberately simulates the hierarchical structure of hum...
详细信息
Traditional image object classification and detection algorithms and strategies cannot meet the problem of video image acquisition and processing. Deep learning deliberately simulates the hierarchical structure of human brain, and establishes the mapping from low-level signals to high-level semantics, so as to achieve hierarchical feature representation of data. Deep learning technology has powerful visual information processing ability, which has become the forefront technology and domestic and international research hotspots to deal with this challenge. In order to solve the problem of target space location in video surveillance system, time-consuming and other problems, in this paper, we propose the algorithm based on RNN-LSTM deep learning. At the same time, according to the principle of OpenGL perspective imaging and photogrammetry consistency, we use 3D scene simulation imaging technology, relying on the corresponding relationship between video images and simulation images we locate the target object. In the 3D virtual scene, we set up the virtual camera to simulate the imaging processing of the actual camera, and the pixel coordinates in the video image of the surveillance target are substituted into the simulation image, next, the spatial coordinates of the target are inverted by the inverse process of the virtual imaging. The experimental results show that the detection of target objects has high accuracy, which has an important reference value for outdoor target localization through video surveillance images.
Within the broad ambit of algorithm design, the study of dynamic graph algorithms continues to be a thriving area of research. Commensurate with this interest is an extensive literature on the topic. Not surprisingly,...
详细信息
Within the broad ambit of algorithm design, the study of dynamic graph algorithms continues to be a thriving area of research. Commensurate with this interest is an extensive literature on the topic. Not surprisingly, dynamic algorithms for all varieties of shortest path problems, in view of their practical importance, occupy a preeminent position. Relevant to this paper are fully dynamic algorithms for chordal graphs. Surprisingly, to the best of our knowledge, there seems to be no reported results for the problem of dynamic algorithms for strongly chordal graphs. To redress this gap, in this paper, we propose a semi-dynamic algorithm for edge-deletions and a semi-dynamic algorithm for edge-insertions in a strongly chordal graph, G. The query complexity of an edge-deletion is O(d(u)(2)d(v)(2)), where d(u) and d(v) are the degrees of the vertices u and v of the candidate edge {u,v}, while the query complexity of an edge-insertion is O(n(2)), where n is the number of vertices of G.
Prufer algorithm is a powerful method for topology vectorization, but the traditional prufer algorithm method can only encode a rootless labeled tree, and no prior work has studied the method of applying it to the gra...
详细信息
Prufer algorithm is a powerful method for topology vectorization, but the traditional prufer algorithm method can only encode a rootless labeled tree, and no prior work has studied the method of applying it to the graph vectorization. This paper proposes a vectorization method for undirected labeled graphs based on the prufer algorithm, including graph encoding and decoding algorithms. A particular case was discovered by preliminary experiments, which will reduce the accuracy of the coding algorithm (when the node size reaches more than 150, the accuracy can only reach about 60%), so a connectivity check mechanism that based on the Warshall algorithm is proposed and added to the coding algorithm. A large number of experimental verifications show that the accuracy of the coding algorithm can reach 100% after introducing this mechanism. Then the length of the vector generated by the coding algorithm is analyzed, and the results show that graph vectorization can improve the efficiency of partial topology calculation. Finally, the defects of the algorithm are discussed. The most significant defect is that the length of the vector generated by the encoding algorithm is uncertain, which will prevent it from being applied to more topological calculations.
This paper introduces streamlined constant-time variants of Euclid’s algorithm, both for polynomial inputs and for integer inputs. As concrete applications, this paper saves time in (1) modular inversion for Curve255...
详细信息
Network Function Virtualization (NFV) is a promising paradigm which can increase network flexibility by deploying newly network services into networks. Because of the flexibility, NFV is also considered as one of the ...
详细信息
Network Function Virtualization (NFV) is a promising paradigm which can increase network flexibility by deploying newly network services into networks. Because of the flexibility, NFV is also considered as one of the building blocks for 5G and edge computing. However, the intrinsic dynamic features of NFV and the rigorous requirements proposed by 5G and edge computing, such as delay, pose significant challenges to make the optimal Virtual Network Function (VNF) chain placement. To address this problem, we first formulate the VNF chain placement problem as an integer linear programming problem with taking the dynamic characteristics in to consideration. Then we propose an efficient dynamic algorithm, called DynAmic vnF placemenT (DAFT), which provides a good solution for VNF chain placement. DAFT is based on primal–dual technique and combines with an efficient subroutine which is solved by reducing to the shortest path problem. The theoretic analysis shows DAFT is ( 1 − 1 ∕ e ) -competitive to offline optimal solution. We also propose a modified algorithm concerning algorithm implementation issues, which is called Feasible DAFT (FDAFT). Finally, we evaluate the proposed algorithms through extensive numerical simulations. The experiment results show that DAFT and FDAFT achieve average competitive ratios up to 98.42% and 96.74%, respectively and outperform the compared algorithms around 50%.
A study is conducted to assess the implicit error associated with the use of the Goodman–Robinson rotation-vector equation in the presence of such angular motions, and to evaluate the potential of a simple algorithmi...
详细信息
A study is conducted to assess the implicit error associated with the use of the Goodman–Robinson rotation-vector equation in the presence of such angular motions, and to evaluate the potential of a simple algorithmic enhancement of this equation to improve attitude accuracy. The simplified Goodman–Robinson rotation-vector equation approximates the second term on the right-hand side of the first equation using the integral of the angular-rate vector instead of the rotation vector, with the third term being eliminated altogether. To determine the accuracy associated with the Goodman–Robinson rotation-vector equation, two angular-rate profiles are considered, such as a generalized angular rate and a coning angular rate.
In this paper we propose and analyze various approaches to organizing routing in a triple loop circulant topologies as applied to networks-on-chip: static routing based on universal graph search algorithms, such as Di...
详细信息
In this paper we propose and analyze various approaches to organizing routing in a triple loop circulant topologies as applied to networks-on-chip: static routing based on universal graph search algorithms, such as Dijkstra's algorithm and a possible implementation using Table routing;algorithms created analytically based on an engineering approach with taking into account the structural features of triple loop circulant graphs (Advanced clockwise, Direction selection);an algorithm created on the basis of a mathematical analysis of graph structure and solving the problem of enumerating coefficients at generators (Coefficients finding algorithm). Efficiency, maximum graph paths, occupied memory resources, and calculation time of the algorithms developed are estimated. Comparison of various variants of the algorithms is made and recommendations on their application for the development of networks-on-chip with triple loop circulant topologies are given. It is shown that Advanced clockwise and Direction selection algorithms guarantee that the packet reaches the destination node, but often in more steps than the shortest path. Nevertheless, they themselves are simpler and require less hardware resources than other algorithms. In turn, Coefficients finding algorithm has great computational complexity, but is optimal and, in comparison with Dijkstra's algorithm, is much simpler for RTL implementation which reduces network-on-chip routers resources cost.
The concept of channel, a computational mechanism used to convey state to different threads of process execution, is at the core of the design of multi-threaded concurrent algorithms. In the case of concurrent evoluti...
详细信息
ISBN:
(纸本)9783030310196;9783030310189
The concept of channel, a computational mechanism used to convey state to different threads of process execution, is at the core of the design of multi-threaded concurrent algorithms. In the case of concurrent evolutionary algorithms, channels can be used to communicate messages between several threads performing different evolution tasks related to genetic operations or mixing of populations. In this paper we study to what extent the design of these messages in a communicating sequential process context may influence scaling and performance of concurrent evolutionary algorithms. For this aim, we designed a channel-based concurrent evolutionary algorithm that is able to effectively solve different benchmark binary problems (e.g. OneMax, LeadingOnes, RoyalRoad), showing that it provides a good basis to leverage the multithreaded and multi-core capabilities of modern computers. Although our results indicate that concurrency is advantageous to scale-up the performance of evolutionary algorithms, they also highlight how the trade-off between concurrency, communication and evolutionary parameters affect the outcome of the evolved solutions, opening-up new opportunities for algorithm design.
This paper presents a multidisciplinary designalgorithm of the ultra-high-speed electrical machine (UHSEM). Presented algorithm enables UHSEM design with a rotational speed of 0.5-1.2 Mrpm, taking into account the mu...
详细信息
This paper presents a multidisciplinary designalgorithm of the ultra-high-speed electrical machine (UHSEM). Presented algorithm enables UHSEM design with a rotational speed of 0.5-1.2 Mrpm, taking into account the mutual influence of thermal, mechanical, and electromagnetic processes. Based on the algorithm, the 138 W UHSEM with a 1.2 Mrpm rotational speed was calculated. Material selection for the active parts of the machine is described. Analysis of the suitable bearings for UHSEM application is presented. Mechanical, electromagnetic, and cooling design aspects are shown with example of the calculated machine. To evaluate the effectiveness of the developed computer models and the calculation method, the experimental model of the 100 W UHSEM was tested in the motor mode at the rotational speed of 500 000 rpm. The test results demonstrated that the multidisciplinary designalgorithm has high accuracy and is suitable for UHSEMs. The discrepancy between developed models and experimental results does not exceed 7%.
Network virtualization provides a promising solution to overcome the ossification of current networks, allowing multiple Virtual Network Requests (VNRs) embedded on a common infrastructure. The major challenge in netw...
详细信息
ISBN:
(纸本)9781728149516;9781728149509
Network virtualization provides a promising solution to overcome the ossification of current networks, allowing multiple Virtual Network Requests (VNRs) embedded on a common infrastructure. The major challenge in network virtualization is the Virtual Network Embedding (VNE) problem, which is to embed VNRs onto a shared substrate network and known to be NP-hard. The topological heterogeneity of VNRs is one important factor hampering the performance of the VNE. However, in many specialized applications and infrastructures, VNRs are of some common structural features e.g., paths and cycles. To achieve better outcomes, it is thus critical to design dedicated algorithms for these applications and infrastructures by taking into accounting topological characteristics. Besides, paths and cycles are two of the most fundamental topologies that all network structures consist of. Exploiting the characteristics of path and cycle embeddings is vital to tackle the general VNE problem. In this paper, we investigated the path and cycle embedding problems. For path embedding, we utilize Multiple Knapsack Problem (MKP) and Multi-Dimensional Knapsack Problem (MDKP), we proposed an efficient and effective MKP-MDKP-based algorithm. For cycle embedding, we proposed a Weighted Directed Auxiliary Graph (WDAG) to develop a polynomial-time algorithm to determine the least-resource-consuming embedding. Numerical results showed our customized algorithms can boost the acceptance ratio and revenue compared to generic embedding algorithms in the literature.
暂无评论