Simulation is the state-of-the-art analysis technique for distributed thermal management schemes. Due to the numerous parameters involved and the distributed nature of these schemes, such non-exhaustive verification m...
详细信息
ISBN:
(纸本)9781479910694
Simulation is the state-of-the-art analysis technique for distributed thermal management schemes. Due to the numerous parameters involved and the distributed nature of these schemes, such non-exhaustive verification may fail to catch functional bugs in the algorithm or may report misleading performance characteristics. To overcome these limitations, we propose a methodology to perform formal verification of distributed dynamic thermal management for many-core systems. The proposed methodology is based on the SPIN model checker and the Lamport timestamps algorithm. Our methodology allows specification and verification of both functional and timing properties in a distributed many-core system. In order to illustrate the applicability and benefits of our methodology, we perform a case study on a state-of-the-art agent-based distributed thermal management scheme.
Fuel treatment is considered a suitable way to mitigate the hazard related to potential wildfires on a landscape. However, designing an optimal spatial layout of treatment units represents a difficult optimization pro...
详细信息
Fuel treatment is considered a suitable way to mitigate the hazard related to potential wildfires on a landscape. However, designing an optimal spatial layout of treatment units represents a difficult optimization problem. In fact, budget constraints, the probabilistic nature of fire spread and interactions among the different area units composing the whole treatment, give rise to challenging search spaces on typical landscapes. In this paper we formulate such optimization problem with the objective of minimizing the extension of land characterized by high fire hazard. Then, we propose a computational approach that leads to a spatially-optimized treatment layout exploiting Tabu Search and General-Purpose computing on Graphics Processing Units (GPGPU). Using an application example, we also show that the proposed methodology can provide high-quality design solutions in low computing time.
Software developers are not necessarily security specialists, security patterns provide developers with the knowledge of security specialists. Although security patterns are reusable and include security knowledge, it...
详细信息
Software developers are not necessarily security specialists, security patterns provide developers with the knowledge of security specialists. Although security patterns are reusable and include security knowledge, it is possible to inappropriately apply a security pattern or that a properly applied pattern does not mitigate threats and vulnerabilities. Herein we propose a method to validate security pattern applications. Our method provides extended security patterns, which include requirement- and design-level patterns as well as a new model testing process using these patterns. Developers specify the threats and vulnerabilities in the target system during an early stage of development, and then our method validates whether the security patterns are properly applied and assesses whether these vulnerabilities are resolved.
Different logotypes represent significant cues for video annotations. A combination of temporal and spatial segmentation methods can be used for logo extraction from various video contents. To achieve this segmentatio...
详细信息
Different logotypes represent significant cues for video annotations. A combination of temporal and spatial segmentation methods can be used for logo extraction from various video contents. To achieve this segmentation, pixels with low variation of intensity over time are detected. Static backgrounds can become spurious parts of these logos. This paper offers a new way to use several segmentations of logos to learn new logo models from which noise has been removed. First, we group segmented logos of similar appearances into different clusters. Then, a model is learned for each cluster that has a minimum number of members. This is done by applying a linear inverse diffusion filter to all logos in each cluster. Our experiments demonstrate that this filter removes most of the noise that was added to the logo during segmentation and it successfully copes with misclassified logos that have been wrongly added to a cluster.
As cyberarchaeology pushes the boundaries of digital replication of space, objects, and arguably, time itself, it simultaneously adjusts mankind's perception of these things, their connection to the individual and...
详细信息
As cyberarchaeology pushes the boundaries of digital replication of space, objects, and arguably, time itself, it simultaneously adjusts mankind's perception of these things, their connection to the individual and to culture, and our ability to analyze these increasingly solid intangible data sets. When considered as part of the evolving global modernist perspective, and as something valuable as a comparative analytical tool- these are useful developments. However, with every innovation, comes a price. And in creating virtually solid simulacra of cultural heritage, we must consider the implications of the removed authenticities cyberarchaeologists are creating. How might the ability to have a virtual copy affect international conservation policies for archaeological sites and collected artifacts? What does a virtual and potentially 3D printable version of an artifact mean to the economics of looting? How might digital augmentation in museums be balanced so as not to replace the real artifacts themselves? In developing the interdisciplinary and collaborative big-system cyberarchaeological methodologies and systems like those at the Center of Interdisciplinary science for Art, architecture, and Archaeology at the University of California, San Diego, the ethical implications of reactions to digitization and digital analysis are being concurrently evaluated so that some flexible contingencies can be built in as a safety measure to protect the authentic from the misuse of its heterotopic virtual counterparts.
Gaussian processes are powerful modeling tools in machine learning which offer wide applicability for regression and classification tasks due to their non-parametric and non-linear behavior. However, one of their main...
详细信息
In this paper, a novel approach for the detection of parcel loading positions on a pallet is presented. This approach realizes a substantial change in comparison to traditional system design of contour detection in de...
详细信息
In this paper, a novel approach for the detection of parcel loading positions on a pallet is presented. This approach realizes a substantial change in comparison to traditional system design of contour detection in de-palletizing processes. Complex 3D-vision systems, costly laser scanners or throughput decreasing local sensor solutions integrated in grippers are substituted by a low-cost Photonic Mixing Device (PMD) camera. By combining PMD technology and a predetermined model of loading situations, stored during the assembly of the pallet, this approach can compensate for the drawbacks of each respective system. An essential part of the approach are computer-graphics methods specific to the given problem to both detect the deviation between the nominal and the actual loading position and if necessary an automated correction of the packaging scheme. From an economic point of view this approach can decrease the costs of mandatory contour checking in automated de-palletizing processes.
We describe an indoor localization technique for smart phones. Our new method, called the Frequency Division Multiplexing Phase Accordance Method (FDM-PAM), uses a beat called a sync pattern composed of a pair of sinu...
详细信息
We describe an indoor localization technique for smart phones. Our new method, called the Frequency Division Multiplexing Phase Accordance Method (FDM-PAM), uses a beat called a sync pattern composed of a pair of sinusoidal waves with slightly different frequencies, which is similar to our original ultrasound ranging technique called the Phase Accordance Method (PAM). By generating multiple sync patterns with different central frequencies and transmitting them from different speakers, FDM-PAM conducts time-difference-of-arrival (TDOA) multilateration for localizing smart phones. In the current implementation of FDM-PAM, the 2D indoor position of a smart phone can be estimated. Three sync patterns are generated by using two out of six sinusoidal waves with frequencies ranging from 14.75 kHz to 17.25 kHz. The transmission of the sync pattern from the speakers lasts 4 ms. Through experiments, we have confirmed that FDM-PAM achieves accuracy of around 10 cm using only a short burst transmission, which indicates that the localization technique is sufficiently rapid and accurate.
Recently, the number of people who suffer from a high level of stress has increased. Too much stress may cause various physical and/or mental disorders. Moreover, sleep disorders are increasing in modern society. The ...
详细信息
ISBN:
(纸本)9781467355094
Recently, the number of people who suffer from a high level of stress has increased. Too much stress may cause various physical and/or mental disorders. Moreover, sleep disorders are increasing in modern society. The aim of our project is to develop a relaxation machine for reducing stress and inducing sleep by using a rocking vibration simulating a mother's embrace and rocking motion of her baby. First, we analyzed a mother's embrace and rocking motion using a 3D motion capture system, and we evaluated the sleep-inducing effect on adults by using an excitation apparatus simulating the mother's motions. We found from the experimental analysis that there are two types of motions, both consisting of linear motion and rotational motion. The effectiveness of the rocking motion for inducing sleep was verified from brain signal analysis.
暂无评论