Graph isomorphism problem has applications in many fields, such as chemistry, computer science, electronics, and network theory. But the exponential complexity of the algorithm makes the testing is time consuming. In ...
详细信息
Mining of repeated patterns from HTML documents is the key step towards Web-based data mining and knowledge extraction. Many web crawling applications need efficient repeated patterns mining techniques to generate the...
详细信息
Inverse distance weighting (IDW) interpolation and viewshed are two popular algorithms for geospatial *** interpolation assigns geographical values to unknown spatial points using values from a usually scattered set o...
详细信息
Inverse distance weighting (IDW) interpolation and viewshed are two popular algorithms for geospatial *** interpolation assigns geographical values to unknown spatial points using values from a usually scattered set of known points,and viewshed identifies the cells in a spatial raster that can be seen by *** the implementations of both algorithms are available for different scales of input data,the computation for a large-scale domain requires a mass amount of cycles,which limits their *** to the growing popularity of the graphics processing unit (GPU) for general purpose applications,we aim to accelerate geospatial analysis via a GPU based parallel computing *** this paper,we propose a generic methodological framework for geospatial analysis based on GPU and its programming model Compute Unified Device Architecture (CUDA),and explore how to map the inherent parallelism degrees of IDW interpolation and viewshed to the framework,which gives rise to a high computational *** CUDA-based implementations of IDW interpolation and viewshed indicate that the architecture of GPU is suitable for parallelizing the algorithms of geospatial *** results show that the CUDA-based implementations running on GPU can lead to dataset dependent speedups in the range of 13-33-fold for IDW interpolation and 28-925-fold for viewshed *** computation time can be reduced by an order of magnitude compared to classical sequential versions,without losing the accuracy of interpolation and visibility judgment.
We consider the greedy scheduling based on the physical model in wireless networks with successive interference cancellation (SIC). There are two major stages in a scheduling scheme, link selection (to decide which li...
详细信息
ISBN:
(纸本)9781612842325
We consider the greedy scheduling based on the physical model in wireless networks with successive interference cancellation (SIC). There are two major stages in a scheduling scheme, link selection (to decide which link is scheduled next) and time slot selection (to deciding which slot is allocated to a given link). Most available schemes take a first-fit policy in the latter and strive to achieve good performance by careful selection of link ordering with respect to interference. Due to the accumulation effect and sequential detection nature of SIC, however, it is difficult to evaluate the interference of a link. As a result, many existing scheduling schemes become less efficient. In this paper, we take a new look on the problem and focus to the time slot selection stage. We define tolerance margin to measure the saturation of a link set and present two heuristic policies: one is to schedule a link to a slot such that the resulting set of links has a maximum tolerance margin;the other is to choose a slot such that the increase of tolerance margin is minimum. Simulation results show that the performance of the proposed schemes is better than the first-fit policy and is close to the optimal solution.
In order to accommodate the wide range of applications and the corresponding platforms where the H.264/AVC standard is currently in place, one should be able to optimize the encoder's computational complexity with...
详细信息
In order to accommodate the wide range of applications and the corresponding platforms where the H.264/AVC standard is currently in place, one should be able to optimize the encoder's computational complexity with a careful selection of the coding configuration parameters. Motion estimation is the most time-consuming part of the encoder which constitutes up to 75% of the computational complexity. In this paper, the optimum selection of configuration parameters, including search range, reference frame, degree of down-sampling and number of truncation bits have been analyzed for the VLSI implementation of integer motion estimation in terms of distortion-complexity performance. Furthermore, the optimum parameter sets have been presented for different video sizes and different constraints on computational power.
In this paper, a power aware mapping of a reconfigurable video coding (RVC) representation of an H.264/AVC encoder on a heterogeneous many-core platform has been presented. Through this example the benefits of using R...
详细信息
In this paper, a power aware mapping of a reconfigurable video coding (RVC) representation of an H.264/AVC encoder on a heterogeneous many-core platform has been presented. Through this example the benefits of using RVC for flexible and future proof implementations has been highlighted. Furthermore, the low cost modeling of the power efficient mapping algorithm enables dynamic mapping of applications on many-core platforms where power is a concern. Preliminary results indicate that the mapped encoder is much more efficient in terms of power consumption without any significant impact on its performance.
A passive universal image steganalysis method is proposed that is shown to be of higher detection accuracy than existing truly blind steganalysis methods including Farid's and the WAM. This is achieved by improvin...
详细信息
A passive image steganalysis method is proposed to universally detect spatial-domain steganography schemes. It is shown to have better performance than universal steganalyzers known to be powerful in spatial domain, i...
详细信息
ISBN:
(纸本)9780980326741
A passive image steganalysis method is proposed to universally detect spatial-domain steganography schemes. It is shown to have better performance than universal steganalyzers known to be powerful in spatial domain, including the WFLogSv and the WAM methods. This level of accuracy is the result of improving the WFLogSv steganalyzer by considering a more comprehensive relationship between the singular values of each image block and the linear correlation of the rows and the columns. That is, instead of the closeness of the lower singular values to zero, the energy distribution of the singular values is investigated. An innovative measure is proposed for this investigation, which is inspired from arithmetic mean-geometric mean inequality. Experimental results confirm the supremacy of the proposed steganalysis scheme over its counterparts.
We consider the multiple-input multiple-output broadcast channels and the per user unitary and rate control (PU~2RC) transmission and we characterize the performance of this transmission scheme for arbitrary number of...
详细信息
ISBN:
(纸本)9781457713460
We consider the multiple-input multiple-output broadcast channels and the per user unitary and rate control (PU~2RC) transmission and we characterize the performance of this transmission scheme for arbitrary number of active users in the network. In this paper we first introduce the method of computing the probability distribution of the feedback SINR in the PU~2RC and will show that unlike the common assumption, the maximum of SINR in the different orthogonal sets are not independent of each other. In the next step we introduce a method to evaluate an upper and lower bound over the achievable rates in the PU~2RC transmission scheme that can characterize its throughput performance and the results can be used in the optimal feedback designs and Multimode switching.
暂无评论