In this paper, we propose an FPGA solver for the maximum clique problems encoded into the partial maximum satisfiability (partial MaxSAT). Given a Boolean formula with hard constraints that required to be satisfied an...
详细信息
ISBN:
(纸本)9781538666906
In this paper, we propose an FPGA solver for the maximum clique problems encoded into the partial maximum satisfiability (partial MaxSAT). Given a Boolean formula with hard constraints that required to be satisfied and soft constraints that are desired to be satisfied, the goal of partial MaxSAT is to find a truth assignment that satisfies all hard constraints and as many soft constraints as possible. The maximum clique problem involves finding a clique with the maximum possible number of vertices in a given graph, which can be formulated as partial MaxSAT in a natural way. The Dist algorithm is one of the best performing local search algorithms for solving partial MaxSAT. In this paper, we reconstruct the Dist algorithm to leverage its inherent parallelism while maintaining the accuracy of the algorithm for maximum clique problems and then describe the implementation of the algorithm on FPGA. Our FPGA solver can solve partial MaxSAT-encoded maximum clique problems up to 22 times faster than the Dist algorithm on CPU.
Cupping therapy also well known as Hijama is an ancient and holistic method for treatment variety of infirmities particularly cardiovascular diseases such as hypertension. In this method, suction mechanism used to cre...
Cupping therapy also well known as Hijama is an ancient and holistic method for treatment variety of infirmities particularly cardiovascular diseases such as hypertension. In this method, suction mechanism used to create partial vacuum inside the cup that mobilizes the blood flow and promotes effective healing at the specific point. As practise, the selection of the points based is on patient's complaints. The aim of this study is to identify the least number yet the most effectiveness point at minimal cost to treat hypertension disease. The graph colouring method is applied, besides C# language is used to validate the result. The finding of this research indicates that the optimum number of hypertension medical cupping points is two.
In wireless sensor networks (WSN), energy consumption is one of the crucial issues. It is very important to conserve energy at each sensor node to prolong a network lifetime. The main challenge in WSN is to develop an...
详细信息
ISBN:
(纸本)9781538628607
In wireless sensor networks (WSN), energy consumption is one of the crucial issues. It is very important to conserve energy at each sensor node to prolong a network lifetime. The main challenge in WSN is to develop an energy efficient algorithm to minimize energy consumption during transmitting information from deployed sensors up to the cloud resources. Many researches have been studied the designing of energy efficient technique based on one-layer stack model approach. In this study, we propose Energy-Efficient Cross-Layer (EECL) approach by using the interaction of MAC layer and physical layer information to be exploited by a network layer to achieve energy efficient communication. More precisely, network layer could utilize the MAC layer and physical layer information to establish an energy efficient route path to be used in forwarding data. The proposed EECL approach uses X-MAC protocol in support of duty cycle which introduces short preambles that switches to wake-up/sensing mode only for nodes belonging to routing path while the other nodes set to be in sleep mode. The distance between nodes that influences energy consumption and Bit Error Rate (BER) are set to be the parameters which they are help in indicating the required power for each hop during route path selection in WSN and avoid the rely-hops that suffering from high average BER and with farther distance. We conduct the experiment using Matlab to evaluate the effectiveness of our proposed approach in terms of power consumption and obtained data rate. The results show that our proposed EECL approach outperforms its representatives in the ability of tuning the power utilized in respect with required data rate that could satisfy the desired Quality-of-Service (QoS).
Cloud Computing is an evolving technology in the field of IT. People are using this technology vastly as it reduces the storage and other services burden of the users as they use the services provided by the cloud. Th...
Cloud Computing is an evolving technology in the field of IT. People are using this technology vastly as it reduces the storage and other services burden of the users as they use the services provided by the cloud. There are many advantages related to this technology like unlimited storage, cost effectiveness but lacking the strong authentication process. Many researchers are working on the security issue of cloud like user confidentiality, integrity and authenticity etc. However, in this paper we have reviewed and discussed several papers that are related to the authentication in cloud environment. Moreover, after studying different authentication system made by the researchers, we have critically analysed them and found advantages and disadvantages along with some suggestions for the future work.
Wireless technology is developing very fast. Most of the researchers are working in the field of wireless communication. VANET is an evolving technology in the field of wireless communication and with the advancement ...
Wireless technology is developing very fast. Most of the researchers are working in the field of wireless communication. VANET is an evolving technology in the field of wireless communication and with the advancement it will contribute more to the smart transportation system in days to come. VANET gives a communication framework that has enhanced the traffic service and helped in reducing the road accidents. Data sharing in this system is time sensitive and require quick and vigorous network connection forming. VANET is serving the said purposes but there are some issues and challenges like efficient handling of fast handovers for video streaming applications. Therefore, in this paper we have reviewed and discussed several studies related to the routing protocols to judge which one is the best for video applications in VANET. Moreover, after studying different systems made by the researchers, we have critically analyzed them and found advantages and disadvantages for the future works. Also, simulation is performed to check the delays and throughput comparisons between the routing protocols. Furthermore, with the experiments we have proven that the AODV performance is better than the other ad-hoc protocols in VANET environment.
As more knowledge discovery functions or sensing units for event detection are added to sensor devices in the Internet of Things (IoT), devices acquire big data that is bigger than they are able to deliver using their...
详细信息
The Local Binary Pattern (LBP) texture descriptor and some of its variant descriptors have been successfully used for texture classification and for a few other tasks such as face recognition, facial expression, and t...
详细信息
The Local Binary Pattern (LBP) texture descriptor and some of its variant descriptors have been successfully used for texture classification and for a few other tasks such as face recognition, facial expression, and texture segmentation. However, these descriptors have been barely used for image categorisation because their calculations are based on the gray image and they are only invariant to monotonic light variations on the gray level. These descriptors ignore colour information despite their key role in distinguishing the objects and the natural scenes. In this paper, we enhance the Completed Local Binary Pattern (CLBP), an LBP variant with an impressive performance on texture classification. We propose five multiscale colour CLBP (CCLBP) descriptors by incorporating five different colour information into the original CLBP. By using the Oliva and Torralba (OT8) and Event sport datasets, our results attest to the superiority of the proposed CCLBP descriptors over the original CLBP in terms of image categorisation.
The adherence of employees towards Information Security Policy (ISP) established in the organization is crucial in reducing information security risks. Some scholars have suggested that employees' compliance to IS...
详细信息
The primary purpose of carrying out this research work is to identify the crucial factors that influence the continuous use of cloud computing services in organizations. To achieve this identified objective, this rese...
详细信息
The primary purpose of carrying out this research work is to identify the crucial factors that influence the continuous use of cloud computing services in organizations. To achieve this identified objective, this research work carried out a comprehensive literature review on cloud computing services‘ adoption at the organizational level, particularly emphasizing the factors that define the prolonged adoption of cloud computing services. The factors identified, served as a guide required by organizations for completely safe and effective cloud computing service and their use in businesses. This research adopts the criteria of Wymer and Regan as a basis for this study. A total of 53 factors were obtained from prior studies on the cloud computing services‘ adoption. Results obtained during the cause of study revealed that the most crucial factors affecting the continuous use of cloud computing services in organizations are as follows: Relative advantage;Complexity: Perceived security and privacy;Compatibility;Top manager‘s support;Cost reduction;Competitive pressure;IT readiness;Firm size;Vendor support;Regulations and Government policy;Trialability;Perceived reliability;Perceived availability;Uncertainty and Perceived Trust.
In cloud computing, customers-desired Quality of Service (QoS) expectations are quite superficial due to lack of scalable task scheduling solutions that can adjust to long-time changes. Researchers in the literature h...
详细信息
暂无评论