Search results for " computing"
showing 10 items of 2075 documents
A Differential Evolution Framework with Ensemble of Parameters and Strategies and Pool of Local Search Algorithms
2014
The file attached to this record is the author's final peer reviewed version. The publisher's final version can be found by following the DOI link. The ensemble structure is a computational intelligence supervised strategy consisting of a pool of multiple operators that compete among each other for being selected, and an adaptation mechanism that tends to reward the most successful operators. In this paper we extend the idea of the ensemble to multiple local search logics. In a memetic fashion, the search structure of an ensemble framework cooperatively/competitively optimizes the problem jointly with a pool of diverse local search algorithms. In this way, the algorithm progressively adapts…
Analysis of the influence of processor hidden registers on the accuracy of fault injection techniques
2004
Modern processors tend to increase the number of registers, being part of them not accessible by the instruction set. Traditionally, the effect of faults in these hidden registers has not been considered during system validation using fault injection. In this paper, a study of the importance of faults in hidden registers is performed. Firstly, we have analysed the sensitivity of hidden registers to faults in combinational logic. In a second phase, we have analysed the impact of the faults occurred in hidden registers on system behaviour. A broad set of permanent and transient faults have been injected into the models of two typical commercial microcontrollers, using a VHDL-based fault injec…
Long-range & Self-powered IoT Devices for Agriculture & Aquaponics Based on Multi-hop Topology
2019
This article presents the prototype design and testing of a long-range, self-powered IoT devices for use in precision agriculture and aquaponics. The devices are designed using the ultra-low power nRF52840 microcontroller with Bluetooth 5 support and ambient energy harvesting. A power of 942µW is harvested in an indoor environment. The devices are therefore suitable for both indoor and outdoor use, as natural sunlight will provide far more energy compared to artificial indoor lights. A line-of-sight range of up to 1.8km is achieved with the use of coded transmissions. However, the coverage area and range can be extended significantly by deploying the devices in multi-hop network topology. T…
Optimal temporal resolution for detailed studies of cloud-enhanced sunlight (Overirradiance)
2013
Enhancement of sunlight by clouds can lead to irradiance peaks much exceeding the extraterrestrial levels - close to 2 suns near the Equator and at least 1.5 suns at latitudes of about 60°. Some extreme overirradiance events can last many minutes, but durations in the order of 1 second are also possible. The present paper reports the shortest bursts recorded in Southern Norway in the years 2012 and 2013. Our records of 10-millisecond resolution from 2012 show that the optimal instantaneous irradiance sampling interval is less than 0.15 s at the present test site, while the optimal averaging time is less than 0.13 s. We propose simple equations for deriving these times in an arbitrary geogra…
Fusing storage and computing for the domain of business intelligence and analytics: research opportunities
2015
With the growing importance of external and shared data, the set of requirements for Business Intelligence and Analytics (BIA) is shifting. Current solutions still come with shortcomings, esp. In multi-stakeholder environments where sensitive content is exchanged. We argue that a new level in the evolution of BIA can be unlocked by tearing down the barriers between storage and computing based on upcoming storage technologies. In particular, we propose a revitalization of ideas from object-oriented databases. We present results from a joint project that aimed at delineating design options for BIA solutions built upon this idea. The paper outlines the interplay of various architectural layers…
Spectrum Hole Detection for Cognitive Radio through Energy Detection using Random Forest
2020
The growth of wireless data is the major driving force for an exponential increase in wireless communication. Cognitive Radio is one of the emerging wireless technologies that can be used for smart utility networks. Optimum utilization of the wireless spectrum is the objective of Cognitive Radio. Finding a spectrum hole through intelligent means is essential for the success of Cognitive Radio. Dynamic spectrum allocation is also an efficient technique for spectrum allocation. It will lead to a better spectrum utilization. In this paper, some of the machine learning techniques are used to find a frequency range for dynamic spectrum allocation. Different machine learning techniques such as Lo…
The Sound of Swarm. Auditory Description of Swarm Robotic Movements
2023
Movements of robots in a swarm can be mapped to sounds, highlighting the group behavior through the coordinated and simultaneous variations of musical parameters across time. The vice versa is also possible: sound parameters can be mapped to robotic motion parameters, giving instructions through sound. In this article, we first develop a theoretical framework to relate musical parameters such as pitch, timbre, loudness, and articulation (for each time) with robotic parameters such as position, identity, motor status, and sensor status. We propose a definition of musical spaces as Hilbert spaces, and musical paths between parameters as elements of bigroupoids, generalizing existing conceptio…
Simulation and Test of UAV Tasks With Resource-Constrained Hardware in the Loop
2021
Simulations are indispensable to reduce costs and risks when developing and testing algorithms for unmanned aerial vehicles (UAV) especially for applications in high risk scenarios like search and rescue (SAR) operations and post-disaster damage assessment. Many UAV applications require real-time tasks for which the timeliness of computations is fundamental. However, standard simulation tools are not guaranteed to run in sync with real-time events, leading to unreliable assessments of the ability of the target hardware to perform specific tasks. In this work we present a simulation and test system able to run UAV tasks on resource-constrained target hardware possibly adopted in these applic…
Self-management of Information Systems
2016
The paper discusses self-management features that are intended to support the usage and maintenance processes in the information system life. Instead of a universal solutions that are evolved by many researchers in the autonomic computing field, this approach, called smart technologies, anticipates self-management features by including autonomic components into information systems directly. The approach is practically applied in several information systems, and the gained results show that the implementation of self-management features requires relatively modest resources. Thereby the approach is suitable even for smaller projects and companies.
Parallel Computing for the study of the focusing Davey-Stewartson II equation in semiclassical limit
2012
The asymptotic description of the semiclassical limit of nonlinear Schrödinger equations is a major challenge with so far only scattered results in 1 + 1 dimensions. In this limit, solutions to the NLS equations can have zones of rapid modulated oscillations or blow up. We numerically study in this work the Davey-Stewartson system, a 2 + 1 dimensional nonlinear Schrödinger equation with a nonlocal term, by using parallel computing. This leads to the first results on the semiclassical limit for the Davey-Stewartson equations.