The calculation of small-scale data is commonly used in scientific computing and application domain, and the high-efficiency method of small calculation can give play to the potency of many calculation and application...
详细信息
ISBN:
(纸本)9781467386456
The calculation of small-scale data is commonly used in scientific computing and application domain, and the high-efficiency method of small calculation can give play to the potency of many calculation and application. In this paper, a novel self-adaptive parallel computing method based on the graphics processing unit (GPU) architecture for batches of small scale computing tasks is proposed herein. It also provides two other implementation methods, which are the CPU algorithm and the traditional GPU algorithm, and then compares the efficiency of the three schemes. The experimental results show that the implementation efficiency of this new method on the GPU is better than that of method executed by the CPU and that of the traditional GPU algorithm for batching small-scale computing tasks. And this new approach is furthest utilizing the GPU resources, while a large amount of data is processed.
Acquisition is a key technology in DSSS *** differential correlation is usually employed to eliminate the effect of frequency ***,as the length of pseudo-code grows and the decrease of the SNR,the traditional differen...
详细信息
Acquisition is a key technology in DSSS *** differential correlation is usually employed to eliminate the effect of frequency ***,as the length of pseudo-code grows and the decrease of the SNR,the traditional differential acquisition algorithms will result in great loss of *** paper presents an improved differential acquisition method,named as M-orders Auto-Correlation based on Differential correlation(MAC-DF).In the proposed method,the input signal is multiplied by the complex conjugate of the pseudo-code to eliminate its *** that,the product is applied to the M-orders Auto-Correlation to compensate the SNR loss caused by the differential *** means of mathematical model to analyze its acquisition *** compare MAC-DF acquisition algorithm with the differential coherent and non-coherent acquisition algorithms through *** simulation results indicate that this algorithm is approximately 5-6dB superior to the traditional differential acquisition algorithms in improving acquisition sensitivity and more adaptive to work under low SNR.
Partial AUC is a popular performance metric used in many applications such as bioinformatics and biometrics. Optimizing this measure directly is often challenging since no close form solution exists. In recent work, N...
详细信息
Threshold secret sharing (SS), also denoted as (t, n) SS, has been used extensively in the area of information se- curity, such as for group authentication, cloud storage schemes, secure parallel communication and wir...
详细信息
Threshold secret sharing (SS), also denoted as (t, n) SS, has been used extensively in the area of information se- curity, such as for group authentication, cloud storage schemes, secure parallel communication and wireless mul- tipath routing protocols. However, a (t, n) SS cannot de- tect any deceptions among the dealer and shareholders. Veriable secret sharing (VSS) overcomes the weakness of (t, n) SS in such a way that it is able to detect cheaters by verifying the validity of shares or the correctness of the recovered secret under the condition that both shares and the secret are not compromised. Recently, two non- interactive VSSs based on Asmuth-Bloom's SS were pro- posed by Harn et al. and Liu et al., respectively. Both VSSs require shareholders to examine the range of values of some integers related to the secret before recovering the secret, which is a time-consuming operation. In this paper, we propose a novel integratable VSS mechanism that integrates the concepts of the generalized Chinese remainder theorem (GCRT), Shamir's SS and Asmuth- Bloom's SS. Our proposed VSS can verify that the secret reconstructed by any t or more shareholders is the same as the one that the dealer has generated. Analysis shows that our proposed VSS can provide perfect secrecy and better efficiency.
Protein folding is one of the most important problems in molecular biology. The kinetic order of protein folding is one of the main aspects of the folding process. Previous methods for predicting protein folding kinet...
详细信息
Differential evolution (DE) is a population-based random optimisation algorithm, which has been used to solve benchmark functions and real-world optimisation problems. The DE has three important operators: mutation, c...
详细信息
In this paper, we propose a mobility model for opportunistic networks in a commercial area (MMCA). The commercial area is divided into two parts: internal and external areas. We modified the traditional susceptible-in...
详细信息
In this paper, we propose a cross-layer power allocation scheme over wireless relay networks for quality-of-service(QoS) guarantees. We formulate our original throughput maximization problem into effective capacity ma...
详细信息
In this paper, we propose a cross-layer power allocation scheme over wireless relay networks for quality-of-service(QoS) guarantees. We formulate our original throughput maximization problem into effective capacity maximization problem by applying information theory and the concept of the effective capacity. In our scheme, we focus on full duplex mode and amplify-and-forward(AF) protocol. In particular, our proposed scheme derives closed-form expressions and analyzes the impacts of the SNR of the interference channel on the performance of full duplex relaying system. For comparison purpose, we also give the analysis of half duplex relaying system. Simulation results show that our proposed power allocation scheme can support diverse QoS guarantees and achieve better effective capacity than equal power allocation scheme and direct transmission scheme. Our analysis also indicate that the perfect full duplex mode can achieve twice optimal effective capacity of the half duplex mode.
The cyclic codes with parity check polynomial the reciprocal of the characteristic polynomial of the Fibonacci recurrence over a prime finite field are shown to have either one weight or two weights. When these codes ...
详细信息
In this paper, we prove existence of optimal complementary dual codes (LCD codes) over large finite fields. We also give methods to generate orthogonal matrices over finite fields and then apply them to construct LCD ...
详细信息
暂无评论