The efficient use of future MPSoCs with f 000 or more processor cores requires new means of resource-aware programming to deal with increasing imperfections such as process variation, fault rates, aging effects, and p...
详细信息
Inspired by the visual system of the fruit fly, we had created a generic building block for neuromorphic hardware that is vital for third generation neural networks. This enables time delay to be parametrized in a che...
详细信息
Warehouses are an important logistic component of various companies. Warehouses may have different layouts, equipment and their own features. Optimization of warehouse operations can decrease overhead costs and increa...
详细信息
In the article, a new method of building a forecast model using a fuzzy approach for charter air transportation time series with intra-series multiplicative changes is proposed. The method is based on the use of corre...
详细信息
The software reliability represents one of the most crucial aspects of functional safety. Software is used in almost any electronic systems. When a safety-critical system is considered, it has to be ensured that the s...
详细信息
ISBN:
(纸本)9781509025435
The software reliability represents one of the most crucial aspects of functional safety. Software is used in almost any electronic systems. When a safety-critical system is considered, it has to be ensured that the software is able to fulfil the minimum safety requirements. If this is not the case, the software will have to be improved until the minimum requirements are fulfilled. Reliability growth models are used to determine the reliability of software. Depending on the area of application one specific model can deliver better prognosis results than another. This paper serves to introduce a methodology, which is provided for the purpose of selecting the most appropriate model.
Fog computing extends the capabilities of cloud computing by enabling computing at the edge of the network, involving devices such as mobile collaborative devices or fixed nodes with integrated storage, computing, and...
详细信息
A particular problem in using artificial intelligence techniques in the sensor grid is the high power consumption. Remote sensors are usually limited by the amount of power available, thus our general goal is to minim...
详细信息
In this article, the notion of pentagonal fuzzy number (PFN) is introduced in a generalized way. A few articles have been published based on this topic, but they have some ambiguities in defining this type of fuzzy nu...
详细信息
In this article, the notion of pentagonal fuzzy number (PFN) is introduced in a generalized way. A few articles have been published based on this topic, but they have some ambiguities in defining this type of fuzzy number. Here, we proposed the logical definition in developing a pentagonal fuzzy number, along with its arithmetic operations. Based on PFN, the structure of pentagonal fuzzy matrices (PFMs) is studied, together with their basic properties. Some special type of PFMs and their algebraic natures (trace of PFM, adjoint of PFM, determinant of PFM, etc.) are discussed in this article. Finally, the notion of nilpotent PFM, comparable PFM, and constant PFMs, with their many properties, are highlighted in this article.
With single thread performance starting to plateau, HW architects have turned to chip level multiprocessing (CMP) to increase processing power. All major microprocessor companies are aggressively shipping multi-core p...
详细信息
ISBN:
(纸本)1595936025
With single thread performance starting to plateau, HW architects have turned to chip level multiprocessing (CMP) to increase processing power. All major microprocessor companies are aggressively shipping multi-core products in the mainstream computing market. Moore's law will largely be used to increase HW thread-level parallelism through higher core counts in a CMP environment. CMPs bring new challenges into the design of the software system stack. In this tutorial, we talk about the shift to multi-core processors and the programming implications. In particular, we focus on transactional programming. Transactions have emerged as a promising alternative to lock-based synchronization that eliminates many of the problems associated with lock-based synchronization. We discuss the design of both hardware and software transactional memory and quantify the tradeoffs between the different design points. We show how to extend the Java and C languages with transactional constructs, and how to integrate transactions with compiler optimizations and the language runtime (e.g., memory manager and garbage collection).
In this study, propagation prediction models based on ray tracing in coverage estimation for broadcasting systems are compared with respect to computation time and accuracy. Uniform Theory of Diffraction (UTD), Slope ...
详细信息
ISBN:
(纸本)9781934142288
In this study, propagation prediction models based on ray tracing in coverage estimation for broadcasting systems are compared with respect to computation time and accuracy. Uniform Theory of Diffraction (UTD), Slope Diffraction (S-UTD) and Slope UTD with Convex Hull (S-UTD-CH) models are compared for computation time and propagation path loss. Moreover in this study, effects of transmitter height to relative path loss at the receiver are analyzed. S-UTD-CH model is optimum model with respect to computation time and relative path loss.
暂无评论