We present a kinetic‐theory framework for dislocation dynamics in deforming crystals and outline the underlying sub‐problems of stress equilibrium, dislocation density evolution and deformation kinematics, as well a...
We present a kinetic‐theory framework for dislocation dynamics in deforming crystals and outline the underlying sub‐problems of stress equilibrium, dislocation density evolution and deformation kinematics, as well as the constitutive and geometrical connection between these problems.
This paper examines the formation of self-organizing feature maps (SOFM) by the direct optimization of a cost function through a genetic algorithm (GA). The resulting SOFM is expected to produce simultaneously a topol...
详细信息
The article discusses various reports published within the issue including one by Louise Soe and Elaine K. Yakura on women's attrition from technical fields of work, and another by Indira Guzman and Jeffrey M. Sta...
详细信息
The article discusses various reports published within the issue including one by Louise Soe and Elaine K. Yakura on women's attrition from technical fields of work, and another by Indira Guzman and Jeffrey M. Stanton on the potential cultural differences in the workplace.
This paper examines the formation of self-organizing feature maps (SOFM) by the direct optimization of a cost function through a genetic algorithm (GA). The resulting SOFM is expected to produce simultaneously a topol...
详细信息
This paper examines the formation of self-organizing feature maps (SOFM) by the direct optimization of a cost function through a genetic algorithm (GA). The resulting SOFM is expected to produce simultaneously a topologically correct mapping between input and output spaces and a low quantization error. The proposed approach adopts a cost (fitness) function which is a weighted combination of indices that measure these two aspects of the map quality, specifically, the quantization error and the Pearson correlation coefficient between the corresponding distances in input and output spaces. The resulting maps are compared with those generated by the Kohonen's self-organizing map (SOM) algorithm in terms of the quantization error (QE), the weighted topological error (WTE) and the Pearson correlation coefficient (PCC) indices. The experiments show the proposed approach produces better values of the quality indices as well as is more robust to outliers.
In this paper, we present a parallelization of a filtering algorithm related to non-linear anisotropic diffusion, used to enhance the performance of an application in a parallel distributed system. The anisotropic dif...
详细信息
ISBN:
(纸本)9780769532578
In this paper, we present a parallelization of a filtering algorithm related to non-linear anisotropic diffusion, used to enhance the performance of an application in a parallel distributed system. The anisotropic diffusion is a well-established technique for image enhancement by means of diffusivity functions, which act as border attenuators. However, it requires a high computational cost when a large amount of data is used. The proposed implementation was parallelized considering both point-to-point and collective communications, adopting the MPI paradigm. Results from both approaches indicate that the proposed algorithm has reached interesting levels of performance (81% and 93% of efficiency, respectively) when compared to the execution of one process in a single computer node. In addition, our results indicate an enhancement of around 21% utilizing the collective communication strategy when compared to point-to-point communication.
Emerging 64 bitOSpsilas supply a huge amount of memory address space that is essential for new applications using very large data. It is expected that the memory in connected nodes can be used to store swapped pages e...
详细信息
Emerging 64 bitOSpsilas supply a huge amount of memory address space that is essential for new applications using very large data. It is expected that the memory in connected nodes can be used to store swapped pages efficiently, especially in a dedicated cluster which has a high-speed network such as 10 GbE and Infiniband. In this paper, we propose the distributed large memory system (DLM), which provides very large virtual memory by using remote memory distributed over the nodes in a cluster. The performance of DLM programs using remote memory is compared to ordinary programs using local memory. The results of STREAM, NPB and Himeno benchmarks show that the DLM achieves better performance than other remote paging schemes using a block swap device to access remote memory. In addition to performance, DLM offers the advantages of easy availability and high portability, because it is a user-level software without the need for special hardware. To obtain high performance, the DLM can tune its parameters independently from kernel swap parameters. We also found that DLMpsilas independence of kernel swapping provides more stable behavior.
In this paper, we describe an application, PubCloud that uses tagclouds for the summarization of results from queries over thePubMed database of biomedical literature. PubCloud responds toqueries of this database with...
详细信息
ISBN:
(纸本)1595936548
In this paper, we describe an application, PubCloud that uses tagclouds for the summarization of results from queries over thePubMed database of biomedical literature. PubCloud responds toqueries of this database with tag clouds generated from wordsextracted from the abstracts returned by the query. The results ofa user study comparing the PubCloud tag-cloud summarization ofquery results with the standard result list provided by PubMedindicated that the tag cloud interface is advantageous in presenting descriptive information and in reducing user frustrationbut that it is less effective at the task of enabling users to discoverrelations between concepts.
Intrusion detection systems (IDSs) have been substantially improved in recent past. However, network attacks have become more sophisticated and increasingly complex: many of current attacks are coordinated and origina...
详细信息
Intrusion detection systems (IDSs) have been substantially improved in recent past. However, network attacks have become more sophisticated and increasingly complex: many of current attacks are coordinated and originated in multiple networks. To detect these attacks, IDSs need to obtain information on network events from multiple networks or administrative domains. This work demonstrates that a Distributed IDS (DIDS) can be composed of existing IDSs, improving the detection of misuses in a multiple network environment. We use a grid middleware for creating a service-based intrusion detection grid. We demonstrate through experimental results that the proposed DIDS allows the integration of heterogeneous existing IDSs and improves the detection of attacks by exploring the synergy between existing IDSs.
The widely acknowledged problem of reliably identifying the origin of information in cyberspace has been the subject of much research. Due to the nature of the Internet protocol, the source IP can be easily falsified ...
详细信息
ISBN:
(纸本)1601320019
The widely acknowledged problem of reliably identifying the origin of information in cyberspace has been the subject of much research. Due to the nature of the Internet protocol, the source IP can be easily falsified which results in numerous problems including infamous denial of service attacks. The combination of smart devices with powerful processing capabilities once observed only in mainframe computers decades ago and the presence of the Internet which allows communications between all those devices exacerbate the problem. In this paper, we propose a novel technique called Session Based Logging (SBL) for simple and effective IP-Traceback and logging mechanism. SBL is easy to implement and also has significant advantage of saving storage space over previously proposed schemes. Moreover the SBL approach has clear edge under sensitive privacy regulations since it does not need to capture detailed contents of each individual communication session. Experimental results show its potential and ease of execution from free of any agent software installation on the logging machine. The proposed SBL scheme on this paper currently supports only TCP sessions but we believe this approach could be further extended to UDP connections which have many inherent network security problems.
The lattice cellular Potts model is widely used to represent physical and biological cellular systems. Standard implementations of this model in the literature employ inefficient Monte Carlo protocols to select elemen...
详细信息
暂无评论