Packet scheduling algorithm is an important element to provide quality of service (QoS) guarantee. Traditional per-flow packet scheduling methods are often not able to support good scalability. While, the non-per-flow...
详细信息
Packet scheduling algorithm is an important element to provide quality of service (QoS) guarantee. Traditional per-flow packet scheduling methods are often not able to support good scalability. While, the non-per-flow-differentiated methods usually can not provide service guarantee for very individual flow. DPS (dynamic packet state) provides a method to support guaranteed service without per-flow control. It can provide both the service performance and scalability. But its per-packet scheduling results in high comp.tational comp.ex are related with the number of packets. A packet scheduling algorithm with multi-level FIFS queues, which is based on DPS, is provided to get guaranteed service. And the constrained conditions to delay guarantee under this algorithm is also provided. The theoretical analysis and simulations show that the algorithm can schedule packets with constant time comp.exity and the same delay performance as DPS.
In this paper, the state-of-the-art DWSS (distributed Web server system) technologies are described, including their mechanisms, advantages and disadvantages. Then an algorithm TB-CCRD (tag based cache cooperative Web...
详细信息
In this paper, the state-of-the-art DWSS (distributed Web server system) technologies are described, including their mechanisms, advantages and disadvantages. Then an algorithm TB-CCRD (tag based cache cooperative Web requests distribution) for Web requests distribution is presented. Based on it, a scalable high performance DWSS is constructed. In this architecture of DWSS, the front-end server organizes the caches of each backend Web server into a virtual large cache to improve the hit rate of cache and the response time of the DWSS. The operation of TCP connection handoff is distributed among the backend servers to prevent the front-end from becoming a bottleneck of the system. Tags are used to indicate where the content of a URL is cached, so as to avoid extra communications within the system. Through this mechanism, the TB-CCRD DWSS achieves both higher performance and better scalability.
A miniature stereo vision machine to generate high-resolution dense depth maps is developed for application to portable intelligent robots and smart visual interface. The machine uses multiple cameras, each with a ver...
详细信息
A miniature stereo vision machine to generate high-resolution dense depth maps is developed for application to portable intelligent robots and smart visual interface. The machine uses multiple cameras, each with a very wide field of view, to synchronously capture stereo image sequences, and then comp.tes dense depth maps in real time. The whole algorithm, including radial distortion correction, LoG filtering, correspondence finding, and dense depth map comp.tation, is comp.ctly implemented in a single FPGA. The machine, running at 60 MHz, could achieve more than 30 fps for building dense disparity maps with 320 × 240 pixels in 64-pixel disparity search range and 8-bit depth precision.
A cost optimization model for production scheduling is built, which is a multi-mode project scheduling problem subject to the constraints of time, renewable resources and nonrenewable resources. The definitions of the...
详细信息
A cost optimization model for production scheduling is built, which is a multi-mode project scheduling problem subject to the constraints of time, renewable resources and nonrenewable resources. The definitions of the solutions are proposed, and a scheduling algorithm for time feasible cost optimization is developed, which is furthermore updated for time-cost optimization. At last, the experimental simulation results are given.
The magnitude-only external force is modified by integrating direction information explicitly and a new snake model is derived. The new snake model can greatly eliminate the disturbance of false strong edges. Based on...
详细信息
The magnitude-only external force is modified by integrating direction information explicitly and a new snake model is derived. The new snake model can greatly eliminate the disturbance of false strong edges. Based on dynamic programming approach to snake model, a wavelet-based multiscale algorithm is proposed. Combined with Mallat's wavelet-based edge detection theory, the proposed multiresolution algorithm can greatly decrease the amount of comp.tation, become more flexible in selecting filter than continuation method, and has less initial position sensitivity and parameter sensitivity, which enlarges the target capturing region and makes the setting of parameters simplified.
A robust speech recognition system based on the discriminative learning of environmental features was proposed for the recognition of environmental features in high noise background, and a gradient descent algorithm w...
详细信息
A robust speech recognition system based on the discriminative learning of environmental features was proposed for the recognition of environmental features in high noise background, and a gradient descent algorithm was adopted for the parameters optimization. Experiments were carried out at different levels of background noise for SNR, basic accuracy, noise-resistance and system environment adaptability. The experimental results show that the system has good recognition performance in high noisy environments. The system can meet different needs of application.
Software testing is one of the most important ways to increase the quality of a software product. A test data adequacy criterion is a predicate that is used to determine whether a program has been tested enough. Few t...
详细信息
Software testing is one of the most important ways to increase the quality of a software product. A test data adequacy criterion is a predicate that is used to determine whether a program has been tested enough. Few testing criteria care about the total cost of the program under testing. This can easily make the users cost a lot to meet the criteria. In this paper, G-O Model the representative of Non-homogeneous Poisson Process (NHPP) Models is studied, and then a corrected G-O Model (CGOM) is present. A cost model based on CGOM combined with software designing cost, testing cost, maintenance and risk cost due to software failure is developed. In order to minimize the total expected software cost, the optimal release policies are discussed.
A hybrid color segmentation algorithm integrates threshold-based and region-based segmentations to guarantee quick and robust recognition of objects by the robot vision system and a pin-hole model is established for o...
详细信息
A hybrid color segmentation algorithm integrates threshold-based and region-based segmentations to guarantee quick and robust recognition of objects by the robot vision system and a pin-hole model is established for object localization using single camera. This vision system satisfies the robot requirement for real-time and robustness, and has been applied to HIT-II robot.
An improved genetic algorithm based on the evolutionarily stable strategy is proposed to avoid the problem of local optimum. The key to this algorithm lies in the construction of a new mutation operator controlled by ...
详细信息
An improved genetic algorithm based on the evolutionarily stable strategy is proposed to avoid the problem of local optimum. The key to this algorithm lies in the construction of a new mutation operator controlled by a stable factor,, which maintains the polymorphism in the colony by setting a stable factor and changing certain best seeds to mutant. Therefore, the operator can keep the number of the best individuals at a stable level when it enlarges the search space. The simulation experiments show that this algorithm can effectively avoid the premature convergence problem caused by the high selective pressure. Moreover, this algorithm improves the ability of searching an optimum solution and increases the convergent speed. This algorithm has extensive application prospects in many practical optimization problems.
This paper indicates the limitation of traditional firewall and presents the key techniques of distributed firewall, and designs an XML-based network information description way and a hierarchical network security man...
详细信息
This paper indicates the limitation of traditional firewall and presents the key techniques of distributed firewall, and designs an XML-based network information description way and a hierarchical network security management platform to integrate the distributed firewall. The distributed firewall forms a network safeguard system by overcoming the traditional firewall limitation of depending on network topology.
暂无评论