With the introduction of the memristor design by the HP lab, there has been a surge of interest to perform different theoretical and experimental works to investigate various potential applications of the memristor. H...
详细信息
With the introduction of the memristor design by the HP lab, there has been a surge of interest to perform different theoretical and experimental works to investigate various potential applications of the memristor. However, since the memristor is not available commercially, it is essential to design the emulator circuit for the memristors from the available electronic components. In this paper, we present the validation of a previously published memristor emulator through experimentation and introduce a simpler memristor emulator circuit that is built using only one second generation current conveyer (CCII), two diode-connected transistors, a capacitor and some resistors. The proposed circuit satisfies the fingerprints of the memristor in the I-V plane accurately. The circuit is very simple to implement in the lab for educational purpose. Furthermore, the mathematical model and analysis of the proposed emulator circuit are introduced. SPICE simulation and experimental results are also provided.
A noticeable progress has been found in decision making problems since the introduction of soft set theory by Molodtsov in 1999. It is found that classical soft sets are not suitable to deal with imprecise parameters ...
详细信息
ISBN:
(纸本)9781479920747
A noticeable progress has been found in decision making problems since the introduction of soft set theory by Molodtsov in 1999. It is found that classical soft sets are not suitable to deal with imprecise parameters whereas fuzzy soft sets (FSS) are proved to be useful. Use of intuitionistic fuzzy soft sets (IFSS) is more effective in environment, where arguments are presented using membership and non-membership values. In this paper we propose an algorithmic approach for multiple attribute group decision making problems using interval-valued intuitionistic fuzzy soft matrix (IVIFSM). IVIFSM is the matrix representation of interval-valued intuitionistic fuzzy soft set (IVIFSS), where IVIFSS is a natural combination of interval-valued intuitionistic fuzzy set and soft set theory. Firstly, we propose the concept of IVIFSM. Then an algorithm is developed to find out the desired alternative(s) based on product interval-valued intuitionistic fuzzy soft matrix, combined choice matrix, and score values of the set of alternatives. Finally, a practical example has been demonstrated to show the effectiveness of the proposed algorithm.
In this paper, we develop several algorithms for simultaneously optimizing for energy and temperature for executing a set of independent tasks on multicore machines. Simulation results demonstrate that our algorithms ...
详细信息
ISBN:
(纸本)9781479942763
In this paper, we develop several algorithms for simultaneously optimizing for energy and temperature for executing a set of independent tasks on multicore machines. Simulation results demonstrate that our algorithms are effectively in achieving these goals.
The main objective of this paper is develop techniques to maximize the throughput of all cores so that both power and temperature constraints met for a multicore processor. The key levers that we have used for this op...
详细信息
ISBN:
(纸本)9781479942763
The main objective of this paper is develop techniques to maximize the throughput of all cores so that both power and temperature constraints met for a multicore processor. The key levers that we have used for this optimization are the clock frequency as well as throttling of cores. The latter shuts off cores during inactive periods. We propose multiple heuristics for maximizing the data parallel throughput on multi-core processors with different frequency scaling schemes.
The method of random projections has become popular for large-scale applications in statistical learning, information retrieval, bio-informatics and other applications. Using a well-designed coding scheme for the proj...
详细信息
In this paper, the sub-ant-colony scheme is revisited to improve the solution quality of the ant colony system. In the scheme, an original ant colony is divided into several sub-antcolonies, and each sub-ant-colony in...
详细信息
In this paper, the sub-ant-colony scheme is revisited to improve the solution quality of the ant colony system. In the scheme, an original ant colony is divided into several sub-antcolonies, and each sub-ant-colony individually works for its local optimal solution and the best solution among them is output as the final one. The number of ants in a total ant colony is the same as the sum of the ant numbers in individual sub-ant-colonies. Experiments with the TSP data are also conducted to show the approach in general performs better than the original ant colony system. The trade-off between local search and diversity for the scheme is discussed as well.
Many people get lost easily in public places if they are not familiar with the environment. It would be very helpful to have an indoor localization system. Many researches in indoor localization can be found in the li...
详细信息
Many people get lost easily in public places if they are not familiar with the environment. It would be very helpful to have an indoor localization system. Many researches in indoor localization can be found in the literature. However, they usually need to deploy sensors in the environment. It is costly and inconvenient. In this research, we propose to develop a smartphone indoor positioning application based on accelerometer and gyroscope data. The PDR (Pedestrian Dead Reckoning) method is used to build this application. Calibration points are marked both on the floor ground and on the map of the application. The user first finds a calibration mark, stand on it and face the right direction. He/she then place the android icon (representing the user) on top of the calibration point. When he/she starts to move, the android icon also moves on the map following the real-time estimates of step length and orientation change for each step from accelerometer and gyroscope data, respectively. Preliminary results in walking distance and orientation estimation show high accuracy. The application seems promising and useful as long as a map and calibration marks are built in advance.
Transmission control is an important issue in the Internet or other computer networks today. The retransmission scheme in TCP cannot have the best throughput in the network scenarios with more wireless links or compli...
详细信息
Transmission control is an important issue in the Internet or other computer networks today. The retransmission scheme in TCP cannot have the best throughput in the network scenarios with more wireless links or complicated topologies. Some related works proposed the solution by network coding. Network coding is suitable for generate the redundant data for error correction. In this paper, we discussed such solutions. Then we proposed the loss-rate driven coding, LRC, for transmission control. The proposed mechanism can minimize the coding operations. Applying LRC to TCP will have lower power consumption and lower computing resource requirement.
This paper introduces a Chinese Spelling Check campaign organized for the SIGHAN 2014 bake-off, including task description, data preparation, performance metrics, and evaluation results based on essays written by Chin...
Distributed constraint optimization problems enable the representation of many combinatorial problems that are distributed by nature. An important motivation for such problems is to preserve the privacy of the partici...
详细信息
ISBN:
(纸本)9781634391313
Distributed constraint optimization problems enable the representation of many combinatorial problems that are distributed by nature. An important motivation for such problems is to preserve the privacy of the participating agents during the solving process. The present paper introduces a novel privacy-preserving algorithm for this purpose. The proposed algorithm requires a secure solution of several multiparty computation problems. Consequently, appropriate novel secure protocols are devised and analyzed.
暂无评论