Sink Scheduling, in the form of scheduling multiple sinks among sink sites to leverage traffic burden, is an effective mechanism for the energy-efficiency of wireless sensor networks (WSNs). Due to the inherent diffic...
详细信息
ISBN:
(纸本)9781457702495
Sink Scheduling, in the form of scheduling multiple sinks among sink sites to leverage traffic burden, is an effective mechanism for the energy-efficiency of wireless sensor networks (WSNs). Due to the inherent difficulty (NP-hard in general), existing works on this topic mainly focus on heuristic/greedy algorithms and theoretic results remain unknown. In this paper, we fill in the research blank with two algorithms. The first one is based on the Column Generation (CG). It decomposes the original problem into two sub problems and solve them iteratively to approach the optimal solution. However, due to its high computational complexity, this algorithm is only suitable for small scale networks. The other one is a polynomial-time algorithm based on relaxation techniques to obtain an upperbound, which can serve as a performance benchmark for other algorithms on this problem. Through comprehensive simulations, we evaluate the efficiency of proposed algorithms.
Memory optimization is an important strategy to gain high performance for sequence alignment implemented by CUDA on GPGPU. Smith-Waterman (SW) algorithm is the most sensitive algorithm widely used for local sequence a...
详细信息
This paper presents a new tuning method based on model parameters identified in closed-loop. For classical controllers such as PI(D) controllers a large number of simple tuning methods for various application areas ex...
详细信息
ISBN:
(纸本)9781849192521
This paper presents a new tuning method based on model parameters identified in closed-loop. For classical controllers such as PI(D) controllers a large number of simple tuning methods for various application areas exist. However, when it comes to designing a generalised predictive controller (GPC) four parameters have to be specified. To choose those parameters is not a trivial task since they are not directly related to control or regulation performance. The presented tuning method exploits model-parameters to select suitable controller parameters. Additionally, a Rhinehart filter is incorporated in the design to decrease the impact of noise, therefore, a fifth parameter has to be optimised. The proposed method has been tested in simulation and on a real system.
The quality of a classic software engineering process depends on the completeness of project documents and on the inter-phase consistency. In this paper, a method for passing from the requirement specification to the ...
详细信息
ISBN:
(纸本)9788360779026
The quality of a classic software engineering process depends on the completeness of project documents and on the inter-phase consistency. In this paper, a method for passing from the requirement specification to the class model is proposed. First, a developer browses the text of the requirements, extracts the word sequences, and places them as terms into the glossary. Next, the internal ontology logic for the glossary needs to be elaborated. External ontology sources, as Wikipedia or domain ontology services, may be used to support this stage. At the end, the newly built ontology is transformed to the class model. The whole process may be supported with semi-automated, interactive tools. The result should be the class model with better completeness and consistency than using traditional methods.
A popular way to exploit high level programming languages in FPGA designs is to use a soft-core with accompanying software development tools. However, a common shortcoming with the current soft-core offerings is their...
详细信息
OpenCL is a programming language standard which enables the programmer to express the application by structuring its computation as kernels. The OpenCL compiler is given the explicit freedom to parallelize the executi...
详细信息
Marital dissolutions, that include divorces and separations, are considered one of the most adverse events that can influence the health, life quality and welfare of the adults and infants implied. There have been sev...
详细信息
This paper describes a new method for License Plate Detection based on Genetic Neural Networks, Morphology, and Active Contours. Given an image is divided into several virtual regions sized 10×10 pixels, applying...
详细信息
Operating systems have historically been implemented as independent layers between hardware and applications. User programs communicate with the OS through a set of well defined system calls, and do not have direct ac...
详细信息
Taking the strain tensor, the scalar damage variable, and the damage gradient as the state variables of the Helmholtz free energy, the general expressions of the firstorder gradient damage constitutive equations are d...
详细信息
Taking the strain tensor, the scalar damage variable, and the damage gradient as the state variables of the Helmholtz free energy, the general expressions of the firstorder gradient damage constitutive equations are derived directly from the basic law of irreversible thermodynamics with the constitutive functional expansion method at the natural state. When the damage variable is equal to zero, the expressions can be simplified to the linear elastic constitutive equations. When the damage gradient vanishes, the expressions can be simplified to the classical damage constitutive equations based on the strain equivalence hypothesis. A one-dimensional problem is presented to indicate that the damage field changes from the non-periodic solutions to the spatial periodic-like solutions with stress increment. The peak value region develops a localization band. The onset mechanism of strain localization is proposed. Damage localization emerges after damage occurs for a short time. The width of the localization band is proportional to the internal characteristic length.
暂无评论