Various existing optimization and memory consistency management techniques for GPU applications rely on memory access patterns of kernels. However, they suffer from poor practicality because they require explicit user...
详细信息
The Universal Morphology (UniMorph) project is a collaborative effort providing broad-coverage instantiated normalized morphological inflection tables for hundreds of diverse world languages. The project comprises two...
详细信息
This paper analyzes the multi-choice stochastic transportation problem where the cost coefficients of the objective function and the demand parameters of the constraints follow multi-choice *** that the supply paramet...
详细信息
This paper analyzes the multi-choice stochastic transportation problem where the cost coefficients of the objective function and the demand parameters of the constraints follow multi-choice *** that the supply parameters of the constraints in a transportation problem(TP)follow logistic *** main objective of this paper is to select an appropriate choice from the multi-choices for the cost coefficients of the objective function and the demand of the constraints in the TP by introducing Lagrange’s interpolating polynomial in such a way that the total cost is minimized and satisfies the required *** stochastic programming,the stochastic supply constraints of the TP are transformed into deterministic ***,a non-linear deterministic model is *** Lingo software,the optimal solution of the proposed problem is *** illustrate the methodology,a real-life problem on the TP is considered.
In this paper combining the features of swap sequence and swap operation based Particle Swarm Optimization (PSO), Ant Colony Optimization (ACO) and K-Opt operation a hybrid algorithm is proposed to solve well known Tr...
详细信息
This paper deals with the Sudden Infant Death Syndrome (SIDS) problem. The main objective is to limit it by controlling the main reasons that may lead to it. Sudden infant death syndrome is the death without specific ...
详细信息
Finding a document that is similar to a specified query document within a large document database is one of important issues in the Big Data era, as most data available is in the form of unstructured texts. Our testin...
详细信息
The principle of network construction and the principle of request signals service of Secondary surveillance radar systems predetermined the work of the respondents of the considered systems in conditions of intra-sys...
ISBN:
(数字)9781538652640
ISBN:
(纸本)9781538652657
The principle of network construction and the principle of request signals service of Secondary surveillance radar systems predetermined the work of the respondents of the considered systems in conditions of intra-system and intentional correlated and uncorrelated interferences. The article estimates the impact of masking fluctuation interferences on the quality of the request signals detection. It is shown that the choice of time-interval codes as the request signals predetermined the low noise immunity of the considered systems when a channel is exposed by the fluctuation interference.
The paper, basing on analysis of the Monte-Carlo Tree Search (MCTS) method and specific features of its behavior for various cases of usage, proposes a new variant of the method, which was called as Monte-Carlo Tree S...
详细信息
ISBN:
(纸本)9781509030071
The paper, basing on analysis of the Monte-Carlo Tree Search (MCTS) method and specific features of its behavior for various cases of usage, proposes a new variant of the method, which was called as Monte-Carlo Tree Search with Tree Shape Control (MCTS-TSC) and which uses original Depth-Width Criteria (DWCs) for both tree shape estimation and control during search and for estimation and selection of potentially better options for search continuation. Proposed Tree Shape Control (TSC) technique can be used with some other tuning, pruning, and learning techniques. Besides, it can provide better scheduling of MCTS parallelization.
In this paper, we propose a dual-image based reversible data hiding scheme. Here, we divide a secret message into sub-stream of size n bits, where n-1 bits are embedded using Pixel Value Differencing (PVD) and 1 bit i...
详细信息
In this paper, we propose a dual-image based reversible data hiding scheme. Here, we divide a secret message into sub-stream of size n bits, where n-1 bits are embedded using Pixel Value Differencing (PVD) and 1 bit is embedded using Difference Expansion (DE). We consider two consecutive pixels from cover image, calculate the difference between them andthen embed n-1 bits secret message by modifying the pixel pair. Again, we consider that modified pixel pair to embed 1 bit secret message using embedding function. After that, we distribute these two stego pixel pairs among dual image depending on a shared secret key bit stream. At the receiver end, we extract the secret message successfully and recover original cover image from dual stego image without any distortion. Finally, we compare our scheme with other state-of-the-art methods and obtain reasonably better performance in terms of data embedding capacity.
In this article e-leaming traffic which is served by system on the hyper convergent platform is considered. It was done the analysis of the known methods of determine the degree of pulsation of traffic. The method for...
详细信息
暂无评论