In this paper we demonstrate how the Web services based solutions can be effectively utilized and integrated into robotic world. In particular, we consider robotic systems where overall control is not embedded into an...
详细信息
In this paper we demonstrate how the Web services based solutions can be effectively utilized and integrated into robotic world. In particular, we consider robotic systems where overall control is not embedded into any of the robots and the local behavior of each robot is loosely dependent on behavior of other robots. We propose an architecture for swarm action planning based on Web services paradigm exploiting a problem ontology for service discovery, linear logic based service composition for action planning and a task allocation layer for finding the most suitable robot to perform an action. In our solution all entities in the system expose their functionalities as Web services and allow dynamic service discovery and selection.
In modern high performance microprocessors, multi-ported register-files are commonly used and critical in both performance and energy consumption. As capability and issue width of register-file grows, its energy consu...
详细信息
In modern high performance microprocessors, multi-ported register-files are commonly used and critical in both performance and energy consumption. As capability and issue width of register-file grows, its energy consumption increases rapidly. Much prior work about energy-efficient register-file design is focusing on various low levels except for architecture level. In this paper, an accurate architectural level energy model for register-file is proposed and verified, based on which some efficient and practical improvements are presented to save energy without changing the internal circuits or structure of register-file. We implemented a full-customized 64-bit width 64-entry depth physical register-file with 8 read ports and 4 write ports, whose power is as low as 20 mW, in a 1 GHz 4-issue out-of-order 64-bit MIPS microprocessor, Godson-2 [1], using 90 nm CMOS process. 56.0% of reading energy and 20.3% of writing energy can be saved.
This paper addresses the design of multi-hop packet transmissions for the All-to-All Broadcast (AAB) problem in a Wavelength Division Multiplexing (WDM) optical star network. To decrease the optical-electronic-optical...
详细信息
This paper addresses the design of multi-hop packet transmissions for the All-to-All Broadcast (AAB) problem in a Wavelength Division Multiplexing (WDM) optical star network. To decrease the optical-electronic-optical (O/E/O)transformations in multi-hop scheduling, the maximum of hop distances of each packet transmission is limited to a constant. Each node consists of a tunable transmitter and a fixed-tuned receiver (TT-FR configuration), and each tunable transmitter needs a non-negligible tuning latency to switch between different wavelengths. To decrease the influence of the tuning latency in multi-hop scheduling and the time of tuning operations on each transmitter, we adopt simpler methods for constructing less logical topologies when all tunable transmitters change their transmitted wavelengths to other channels in scheduling concurrently. Our multi-hop scheduling has not only a shorter schedule period but also a less number of transmitted wavelengths used.
For the current technique, the tuning latency ¿ on each transmitter is more than the packet transmission time, and it cannot be ignored in packet scheduling. So in order to reduce the serious affection of tuning ...
详细信息
For the current technique, the tuning latency ¿ on each transmitter is more than the packet transmission time, and it cannot be ignored in packet scheduling. So in order to reduce the serious affection of tuning operations, we propose the multi-hop model for the All-to-All Broadcast (AAB) problem in WDM optical star networks with N nodes and w available wavelengths, which the number of hop distance for packet transmissions is limited to a constant ¿. Our strategy can overlap the tuning latency in multi-hop scheduling, and reduce the number of tuning operations on each transmitter to 2¿(w - 1)/¿¿. If ¿ can be completely covered in scheduling, the schedule length is k(k - 1) + ¿ + 2¿(w-1)/¿¿[k 2 ¿(¿+1)/2] time slots, where k = N/w. Otherwise, it is k(k - 1) + ¿ + 2¿(w-1)/¿¿[k¿(¿+1)/2 + ¿] slots. Our proposed method is very suitable for the scalable WDM networks if the number of wavelength is fixed, and its multi-hop schedule length is shorter than that of other scheduling approaches if k is small or ¿ is larger.
In this paper, a Taguchi-sliding-level differential evolution algorithm (TSLDEA) is proposed to use for finding the actual parameters of Chen and Lu chaotic systems. The TSLDEA, a powerful global numerical optimizatio...
详细信息
In this paper, a Taguchi-sliding-level differential evolution algorithm (TSLDEA) is proposed to use for finding the actual parameters of Chen and Lu chaotic systems. The TSLDEA, a powerful global numerical optimization method, combines the differential evolution algorithm (DEA) with the Taguchi-sliding-level (TSL) method. The TSL method is fused in the crossover operation of a DEA. Then, the systematic reasoning ability of the TSL method is incorporated in the crossover operation of a DEA to select the better offspring to achieve the crossover, and consequently enhance the DEA. Therefore, the TSLDEA can be more robust, statistically sound, and quickly convergent. Two illustrative examples of parameter identification of Chen and Lu chaotic systems are given to demonstrate the applicability of the proposed TSLDEA.
There are many desirable features of natural systems: adaptability, robustness, homeostasis, memory, immunity. Biological immune systems seem to exhibit all of these features and more. Thus it is not so surprising tha...
详细信息
There are many desirable features of natural systems: adaptability, robustness, homeostasis, memory, immunity. Biological immune systems seem to exhibit all of these features and more. Thus it is not so surprising that a vigorous research field has emerged, which focuses on understanding biological immune systems and creating new models, algorithms, technologies and theoretical understandings. The field is known collectively as Artificial Immune systems, and comprises a remarkably diverse range of researchers. Biologists join forces with mathematicians to create new models. engineers and computer scientists produce new autonomous intelligent software. Roboticists and specialists in unconventional computation create new control systems or new ways to compute.
For concurrent consideration of reliability and safety of manufacturing systems on the one hand, and flexibility and performance on the other, a specialized control architecture was proposed recently. It consists of a...
详细信息
For concurrent consideration of reliability and safety of manufacturing systems on the one hand, and flexibility and performance on the other, a specialized control architecture was proposed recently. It consists of a strategic controller for online computing (sub-)optimal control strategies under consideration of dynamic models, safety specifications, and learned knowledge. The second building block is an operational controller for providing certified safety when dealing with behaviors that are not completely predictable, for instance in case of faults. This paper extends the architecture by a specific technique for the strategic controller: For the case of an intelligent manufacturing system which reacts adaptively to a human operator, control trajectories for a robot arm are computed online such that collision with the operator is excluded. The computation is based on solving a mixed-integer programming problem that takes a dynamic safety area around the operator into account as constraint.
In this paper, we propose a multiple objective GA scheme to promote watermarking robustness as well as imperceptibility. In contrast with the existing GA based approaches utilizing single objective optimization, we tr...
详细信息
In this paper, we propose a multiple objective GA scheme to promote watermarking robustness as well as imperceptibility. In contrast with the existing GA based approaches utilizing single objective optimization, we treat the image watermarking as a multiple objective optimization problem. Based on this new perspective, the inherent conflict existing in image watermarking can be objectively handled. The experimental study shows that our method indeed outperform the conventional GA-based approach in both robustness and imperceptibility.
A bidirectional transformation consists of a pair of unidirectional transformations: a forward transformation that maps one data structure called source to another called view, and a backward transformation that refle...
详细信息
A bidirectional transformation consists of a pair of unidirectional transformations: a forward transformation that maps one data structure called source to another called view, and a backward transformation that reflects changes in the view to the source. Bidirectional transformation has many useful applications such as replicated data synchronization, presentation-oriented editor development, and software artifact synchronization. In a previous work, we proposed a framework in which a backward transformation is automatically generated from a forward transformation by derivation of a complementary function if the forward transformation is given by a program in a simple functional language. However, the language has a severe restriction that no variable is allowed to be used more than once. In this paper, we show that tupling transformation relaxes this restriction, allowing us to handle a wider class of bidirectional transformations that may contain duplications.
暂无评论