The scheduling of vehicle movement activities is an important component in highspeed railway transit operations planning process. This paper presents a mathematical programming approach to vehicle routing for the Penn...
详细信息
The scheduling of vehicle movement activities is an important component in highspeed railway transit operations planning process. This paper presents a mathematical programming approach to vehicle routing for the Pennsylvania Transrapid Maglev Train System. A mathematical model of the routing procedure is first derived. Based on this model, the vehicle routing problem is formulated into a constrained optimization problem, in which the train miles travelled are maximized subject to various operational and safety requirements. This large scale non-linear optimization problem is then solved by a genetic algorithm.
Sensor networks are becoming increasingly pervasive. Existing methods of aggregation in sensor networks offer mostly standard mathematical operators over homogeneous data types. In this paper, we instead focus on supp...
详细信息
Acquired software products from suppliers are being increasing tremendously because of insufficiency of resources and capable employees. To manage and monitor the product acquisition process effectively according to a...
详细信息
Acquired software products from suppliers are being increasing tremendously because of insufficiency of resources and capable employees. To manage and monitor the product acquisition process effectively according to a signed contract with a supplier, an organization has to define the standard of workflow, deliverable products in each step and staff roles and responsibilities, etc. Thus, there is a need to incorporate these diversified processes into a single process model that could helps to reach the software product acquisition goal. CMMI defines supplier agreement management process area (SAM) that relates to product acquisition but it does not describe how the organization should do to achieve its expectation. This research presents a business workflow process model for SAM process area of CMMI: capability level 2. It consists of three layers: contextual layer, elaboration layer, and definition layer. A software tool called supplier agreement management tool (SAMT) is also developed to help integrate the details of our approach and can be used for the proposed process model.
In this paper, a low-power architecture (ByZFAD Stands for Bypass Zero, Feed A Directly) for shift-and-add multipliers is proposed. The architecture considerably lowers the switching activity of conventional multiplie...
详细信息
ISBN:
(纸本)1595934790
In this paper, a low-power architecture (ByZFAD Stands for Bypass Zero, Feed A Directly) for shift-and-add multipliers is proposed. The architecture considerably lowers the switching activity of conventional multipliers. The modifications include the removal of the shift of B register, direct feeding of A to the adder, bypassing the adder whenever possible, using a ring counter instead of the binary counter, and removal of the partial product shift. To show the efficiency of the architecture, we have compared the switching activity of the proposed architecture with that of the conventional architecture for a radix-2 shift-and-add multiplier. The results for a 32-bit multiplier show that, the proposed architecture lowers the total switching activity up to 76% when compared to the traditional architecture. Copyright 2006 ACM.
In this paper, a routing model for minimizing hot spots in the network on chip (NOC) is presented. The model makes use of AntNet routing algorithm which is based on Ant colony. Using this algorithm, which we call AntN...
详细信息
ISBN:
(纸本)1595934790
In this paper, a routing model for minimizing hot spots in the network on chip (NOC) is presented. The model makes use of AntNet routing algorithm which is based on Ant colony. Using this algorithm, which we call AntNet routing algorithm, heavy packet traffics are distributed on the chip minimizing the occurrence of hot spots. To evaluate the efficiency of the scheme, the proposed algorithm was compared to the XY, Odd-Even, and DyAD routing models. The simulation results show that in realistic (Transpose) traffic as well as in heavy packet traffic, the proposed model has less average delay and peak power compared to the other routing models. In addition, the maximum temperature in the proposed algorithm is less than those of the other routing algorithms. Copyright 2006 ACM.
Several path-planning algorithms for mobile robots have been introduced. Proper architectures for mobile robots to implement the path-planning algorithms are also of interest. If the mobile robots are to perform compl...
详细信息
Applications in mobile multi-agent systems require a high degree of confidence that code that runs inside the system will not be malicious and that any agents which are malicious can be identified and contained. Since...
详细信息
ISBN:
(纸本)1595933956
Applications in mobile multi-agent systems require a high degree of confidence that code that runs inside the system will not be malicious and that any agents which are malicious can be identified and contained. Since the inception of mobile agents, this threat has been addressed using a multitude of techniques, but many of these implementations have only addressed concerns from the position of either the platform or the agent, and very few approaches have undertaken the problem of mobile agent security from both perspectives simultaneously. Furthermore, no middleware exists that facilitates provision of the required security qualities of mobile agent software while extensively focusing on easing the software development burden. In this paper, we introduce a mobile agent system that enhances security functionality by integrating core software and hardware assurance qualities, as well as addressing security concerns from the perspectives of both the platform and the agent. Copyright 2006 ACM.
This paper presents a very fast and low-power address bus encoder which is less dependent on address bus width. Its encoding scheme is the same as TO-XOR encoding method but its encoder and decoder architectures are m...
详细信息
暂无评论