Meta-heuristics are efficient techniques for solving large scale optimization problems in which traditional mathematical techniques are impractical or provide suboptimal solutions. The Shuffled Frog Leaping algorithm ...
详细信息
Meta-heuristics are efficient techniques for solving large scale optimization problems in which traditional mathematical techniques are impractical or provide suboptimal solutions. The Shuffled Frog Leaping algorithm (SFLA) is a stochastic iterative method, bio-inspired on the memetic evolution of a group of frogs when seeking for food, which combines the social behavior-based of the particle swarm optimization technique (PSO) and the global information exchange of memetic algorithms. However, the SFLA algorithm suffers on large execution times, being this problem clearly evident when solving complex optimization problems for embedded applications. This drawback can be overcome by exploiting the parallel capabilities of the SFLA. This paper proposes a hardware parallel implementation of the SFLA algorithm (HPSFLA) using FPGAs (Field programmable gate Arrays) and the efficient floating-point arithmetic. The proposed architecture allows the SFLA to improve the functionality of the algorithm as well as to decrease the execution times by implementing parallel frogs and parallel memeplexes. Three well-known benchmark problems have been used to validate the implemented algorithm and simulation results demonstrate that the HPSFLA speeds-up by factors of 362, 727 and 211 a C-code implementation using an embedded microprocessor for the Sphere, Rastrigin and Rosenbrock benchmarks problems, respectively. Synthesis, simulation and execution time results demonstrate the effectiveness of the proposed HPSFLA architecture for embedded optimization systems.
PatternLab for proteomics is a one-stop shop computational environment for analyzing shotgun proteomic data. Its modules provide means to pinpoint proteins/peptides that are differentially expressed and those that are...
详细信息
Graphs are among the most frequently used structures in computer Science. Some of the properties that must be checked in many applications are connectivity, acyclicity and the Eulerian and Hamiltonian properties. In t...
详细信息
The main knowledge management challenges are to capture, store and reuse contextual knowledge generated during interactions that occur daily in an organization. In this paper, we propose an activity context-aware arch...
详细信息
The main knowledge management challenges are to capture, store and reuse contextual knowledge generated during interactions that occur daily in an organization. In this paper, we propose an activity context-aware architecture to support knowledge management in working processes. The required features for this architecture are processing, reasoning and sharing contextual knowledge involving information about activities performed. We also present results from evaluation of our proposal — A-CoBrA — for a specific domain.
Speculative Multithreading (SpMT) increases the performance by means of executing multiple threads speculatively to exploit thread-level parallelism. By combining software and hardware approaches, we have improved the...
详细信息
We have proposed a checklist-based usability inspection technique (WDP - Web Design Perspectives-Based Usability Evaluation) specific for Web applications' usability evaluation and we are following an experimentat...
详细信息
The technical literature regarding Model-based Testing (MBT) has several techniques with different characteristics and goals available to be applied in software projects. Besides the lack of information regarding thes...
详细信息
ISBN:
(纸本)9781424437436
The technical literature regarding Model-based Testing (MBT) has several techniques with different characteristics and goals available to be applied in software projects. Besides the lack of information regarding these techniques, they could be applied together in a software project aiming at improving the testing coverage. However, this decision needs to be carefully analyzed to avoid loss of resources in a software project. Based on this scenario, this paper proposes an approach with the purpose of supporting the unique or combined selection of MBT techniques for a given software project considering two aspects: the adequacy level between MBT techniques and the software project characteristics and impact of more than one MBT technique in some testing process variables. At the end, preliminary results of an experimental evaluation are presented.
Real time performance of non-interactive rendering of three-dimensional scenes is usually unachievable. Ray tracing is one of the methods used for rendering such scenes. The performance achieved by a sequential softwa...
详细信息
In a previous ARFTG paper, we presented the measurement of the thermally-induced transient drain voltage response of a power Si MOSFET to a step excitation in gate voltage. The data was fit by assuming the drain volta...
详细信息
The last few years have seen considerable interest in the wireless networking research community in analyzing the connectivity of wireless ad-hoc networks formed by a set of nodes distributed in a two dimensional plan...
详细信息
ISBN:
(纸本)9781424458707
The last few years have seen considerable interest in the wireless networking research community in analyzing the connectivity of wireless ad-hoc networks formed by a set of nodes distributed in a two dimensional plane (deployment area) with a (i) uniform probability density function and (ii) uniform transmission range. Although several important and interesting results are known in this domain, most of the connectivity studies consider a fault-free scenario where all nodes are available for network formation and do not consider failures among nodes caused by one reason or another. In very few studies where faults are considered, they are usually considered to be random in nature, i.e., the probability of a node failing is independent of its location in the deployment area. However, such fault scenario is inadequate to capture many realistic situations where the faulty nodes are spatially correlated. This is particularly true in combat environment where an enemy bomb can destroy a subset of nodes confined to a region. In this paper we investigate the impact of region-based faults on the connectivity of wireless networks. Through analysis and simulation, we provide results relating the probability of a network being connected as transmission range and the size of fault-region are varied. If d min (G) denotes the minimum node degree of the network, we provide the analytical expression for P(d min (G) ¿ k), which represents the probability of the minimum node degree being at least k, for k = 1. Moreover, we compute P(¿(G) ¿ k), where ¿(G) represents the connectivity of the graph G formed by the distribution of nodes in the deployment area and examine the relationship between P(d min (G) ¿ k) and P(¿(G) ¿ k) when k = 1.
暂无评论