As a large-scale global parallel file system, Lustre file system plays a key role in High Performance Computing (HPC) system, and the potential performance of such systems can be difficult to predict because the poten...
详细信息
This paper presents a graph cut-based fast texture synthesis algorithm which utilizes CUDA to greatly accelerate the synthesis speed. The whole sample serves as a patch and is laid into the synthesized image repeatedl...
详细信息
In multicore environment, multithreading is often used to improve application performance. However, there are some unexpected anomalies which degrade the performance of multithreading applications. Some of the unexpec...
详细信息
Shim describes unknown key-share attack on the server-specific MAKEP, and Siaw-Lynn Ng demonstrates further limitations of protocol. In the paper, we propose an improved version of server-specific MAKEP. The modified ...
详细信息
An operon is a fundamental unit of transcription and contains specific functional genes for the construction and regulation of networks at the whole genome level. The prediction of operons is critical for understandin...
详细信息
ISBN:
(纸本)9789881701282
An operon is a fundamental unit of transcription and contains specific functional genes for the construction and regulation of networks at the whole genome level. The prediction of operons is critical for understanding gene regulation and functions in newly sequenced genomes. As experimental methods for operon detection tend to be non-trivial and time-consuming, various methods for operon prediction have been proposed in the literature. In this study, a complementary binary particle swarm optimization (CBPSO) is used for operon prediction in bacterial genomes. We used complementary operation to improve the initialization procedure, and then used the intergenic distance, the metabolic pathway and the cluster of orthologous groups (COG) to design a fitness function. The proper values were trained on the Escherichia coli genome. Experimental results show that the prediction accuracy of this method reached 92.6%, 93.6%, 95.8% and 96.3% on Bacillus subtilis, Pseudomonas aeruginosa PA01, Staphylococcus aureus and Mycobacterium tuberculosis genomes, respectively. The proposed method predicted operons with high accuracy for the four test genomes.
This investigation is based on a traditional AB2 systolic array multiplier [ 16] to derive a new CED AB2 multiplier using linear block codes. A novel linear encoding algebra is derived to realize parity-check function...
详细信息
This investigation is based on a traditional AB2 systolic array multiplier [ 16] to derive a new CED AB2 multiplier using linear block codes. A novel linear encoding algebra is derived to realize parity-check functionality. It is based on the syndrome value, and is adopted to detect errors in the multiplication. Altera FPGA with stratix families to simulate our proposed CED multiplier. In the field GF(272), the space overhead of the proposed circuit is around 9.1%. The latency overhead only requires extra two clock cycles. The proposed CED architecture can therefore be utilized effectively in fault-tolerant cryptosystems.
This work presents a novel bit-parallel systolic multiplier for the shifted dual basis of GF(2 m ). The shifted dual basis multiplication for all trinomials can be represented as the sum of two Hankel matrix-vector mu...
详细信息
This work presents a novel bit-parallel systolic multiplier for the shifted dual basis of GF(2 m ). The shifted dual basis multiplication for all trinomials can be represented as the sum of two Hankel matrix-vector multiplications. The proposed multiplier architecture comprises one Hankel multiplier and one (2m-1)-bit adder. The algebraic encoding scheme based on linear cyclic codes is adopted to implement the multiplications with concurrent error correction (CEC). The latency overhead is analytically demonstrated to require extra four clock cycles than as compared by the multiplier without CEC. The block Hankel matrix-vector representation is used to derive a CEC scalable SDB multiplier. In the binary field GF(2 84 ), the space overhead of the proposed bit-parallel architecture using cyclic code is around 22.8%. The proposed CEC scalable multiplier given by seven or fewer injection errors can correct nearly 99.6% of error correction. Unlike the existing concurrent error detection multipliers that apply the parity prediction scheme, the proposed architectures have multiple error-detection capabilities.
The most critical and difficult problem in speech analysis is reliable discrimination among Silence, Unvoiced and Voiced speech. Several methods have been proposed for making this three levels decision and most of the...
详细信息
The most critical and difficult problem in speech analysis is reliable discrimination among Silence, Unvoiced and Voiced speech. Several methods have been proposed for making this three levels decision and most of them need Speech Activity Detection (SAD). In this study, we propose the Estimated Degree of Noise (EDON) to adjust the threshold of speech activity. To estimate the degree of noise, a function was previously prepared using the least-squares (LS) method, from the given (true) DON and the estimated parameter of DON. This parameter is obtained from the Auto-Correlation Function (ACF) of the noisy speech on a frame basis. Issues associated with this EDON for SAD approach are discussed, and experiments are done using the TIMIT database. Experimental result shows that using EDON improves the classification performance specially voiced and silent parts and the efficiency is compared with other existing published algorithms.
In IEEE 802.16-based multi-hop networks, transmissions using a multi-hop high-rate relay path can potentially achieve better throughput and lower delay than when using a single-hop low-rate direct path. Since the hete...
详细信息
In IEEE 802.16-based multi-hop networks, transmissions using a multi-hop high-rate relay path can potentially achieve better throughput and lower delay than when using a single-hop low-rate direct path. Since the heterogeneous services provided by the system are connection oriented, admission control and associated resource reservation mechanisms are required to achieve the desired quality of service (QoS). In this paper, we first discuss the QoS issue for IEEE 802.16 wireless metropolitan area network (MAN) and then propose a dynamic resource management and admission control (DRMAC) scheme for scheduling services as defined in the 802.16 specifications. The DRMAC scheme enables the base station (BS) to allocate appropriate resources to mobile stations (MSs) according to the received signal-to-noise ratio (SNR) from MSs and maximizes the resource utilization through resource borrowing and degradation. The proposed DRMAC scheme not only improves the resource utilization but reduces the blocking probability. Simulation results show that the proposed DRMAC can increase the resource utilization by 34% and reduce blocking probability.
Recently, the number of spam mails is exponentially growing. It affects the costs of organizations and annoying the email recipient. Spammers always try to find the way to avoid filtering out from the email system. At...
详细信息
ISBN:
(纸本)9788988678206
Recently, the number of spam mails is exponentially growing. It affects the costs of organizations and annoying the email recipient. Spammers always try to find the way to avoid filtering out from the email system. At the same time, as an email recipient or network system/administrator, we try to have an effective spam mail filtering technique to catch the spam mails. The problems of spam mail filtering are that each user has different perspective toward spam mails;so there are many types of spam mails, while the challenge is how to detect the various types and forms of spam mails. In this paper, behaviors of spammers are used to customize the filtering rule. The information from the spam messages also can be used to filter spam mails and it can give higher accuracy than the keyword-based method does. We propose a spam classification approach using Random Forest algorithm. Spam Assassin Corpus is selected as a database for classification. It consists of 6,047 email messages, where 4,150 of them are the legitimate messages and the other 1,897 messages are the spam mails.
暂无评论