Search results for "Algorithm design"

showing 10 items of 63 documents

Improving Computing Systems Automatic Multiobjective Optimization Through Meta-Optimization

2016

This paper presents the extension of framework for automatic design space exploration (FADSE) tool using a meta-optimization approach, which is used to improve the performance of design space exploration algorithms, by driving two different multiobjective meta-heuristics concurrently. More precisely, we selected two genetic multiobjective algorithms: 1) non-dominated sorting genetic algorithm-II and 2) strength Pareto evolutionary algorithm 2, that work together in order to improve both the solutions’ quality and the convergence speed. With the proposed improvements, we ran FADSE in order to optimize the hardware parameters’ values of the grid ALU processor (GAP) micro-architecture from a b…

Mathematical optimizationMeta-optimizationComputer scienceCycles per instructionDesign space explorationPareto principleSortingEvolutionary algorithm02 engineering and technologyComputer Graphics and Computer-Aided DesignMulti-objective optimization020202 computer hardware & architecture0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingAlgorithm designElectrical and Electronic EngineeringSoftwareIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
researchProduct

A multi-objective strategy for concurrent mapping and routing in networks on chip

2009

The design flow of network-on-chip (NoCs) include several key issues. Among other parameters, the decision of where cores have to be topologically mapped and also the routing algorithm represent two highly correlated design problems that must be carefully solved for any given application in order to optimize several different performance metrics. The strong correlation between the different parameters often makes that the optimization of a given performance metric has a negative effect on a different performance metric. In this paper we propose a new strategy that simultaneously refines the mapping and the routing function to determine the Pareto optimal configurations which optimize averag…

Mathematical optimizationNetwork on a chipRobustness (computer science)Computer scienceMultipath routingAlgorithm designFault toleranceNetwork topologyMulti-objective optimization2009 IEEE International Symposium on Parallel & Distributed Processing
researchProduct

Proposal and Validation of an Emissivity-Dependent Algorithm to Retrieve Sea-Surface Temperature From MSG-SEVIRI Data

2010

A frequent and accurate determination of sea-surface temperature (SST) would permit an improvement in both the forecasting of natural hazards and the monitoring of the effects of climate change. The Meteosat Second Generation (MSG) spinning enhanced visible and infrared imager (SEVIRI) (MSG-SEVIRI) offers this possibility, since it has a temporal resolution of 15 min. Current algorithms for SST retrieval from MSG-SEVIRI data use angular-dependent coefficients, but they do not use sea-surface emissivity (SSE) as an explicit input. This letter proposes a both angular- and emissivity-dependent split-window equation, together with simple equations to estimate SSE and atmospheric water-vapor con…

MeteorologyInfraredWeather forecastingAtmospheric modelGeotechnical Engineering and Engineering Geologycomputer.software_genreSea surface temperatureTemporal resolutionEmissivityEnvironmental scienceAlgorithm designElectrical and Electronic EngineeringSpinningcomputerAlgorithmPhysics::Atmospheric and Oceanic PhysicsRemote sensingIEEE Geoscience and Remote Sensing Letters
researchProduct

Performance evaluation of simple fingerprint minutiae extraction algorithm using crossing number on valley structure

2008

In fingerprint recognition system, performance of fingerprint feature extraction algorithm is important. We use visual analysis to evaluate this performance. 100 respondents fill a questionnaire consisting of 30 images from fingerprint feature extraction process. We get 12,3 % minutiae points missed by this algorithm. With BOZORTH3 minutiae matching algorithm, the distribution of matching score of 80-fingerprint images are presented and we obtain EER 5.89 % at threshold value 180.

MinutiaeMatching (graph theory)Computer sciencebusiness.industryFeature extractionPattern recognitionImage segmentationFingerprint recognitionFingerprintComputer visionAlgorithm designArtificial intelligencebusinessBlossom algorithm2008 International Conference on Innovations in Information Technology
researchProduct

Network Connectivity and Area Coverage for UAV Fleet Mobility Model with Energy Constraint

2016

International audience; Our main focus through the present paper is on developing an original distributed mobility model for autonomous fleet of interconnected UAVs (Unmanned Aerial Vehicles) performing an area exploration mission. The UAVs, equipped with wireless ad-hoc capabilities, are required to optimally explore an area while maintaining connectivity with their neighboring UAVs and the base station. Because energy is a scarce resource, especially for UAVs, its wise management is quite beneficial for the network lifetime and mission success. Hence, the proposed mobility model, compared to other models in the literature, is the first to ever include the remaining energy level as decisio…

Mobility modelWireless ad hoc networkComputer scienceDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]050801 communication & media studiesComputerApplications_COMPUTERSINOTHERSYSTEMS02 engineering and technologyBase station0508 media and communicationsResource (project management)DTN (Delay Tolerant Networks)0202 electrical engineering electronic engineering information engineeringWireless[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI]business.industryMobility Model05 social sciences020206 networking & telecommunicationsAdhoc NetworksAlgorithm designbusinessFocus (optics)UAVs (Unmanned Aerial Vehicles)Energy (signal processing)Computer network
researchProduct

An Embedded Solution for Multispectral Palmprint Recognition

2018

Palmprint based identification has attracted much attention in the past decades. In some real-life applications, portable personal authentication systems with high accuracy and speed efficiency are required. This paper presents an embedded palmprint recognition solution based on the multispectral image modality. We first develop an effective recognition algorithm by using partial least squares regression, then a FPGA prototype is implemented and optimized through high-level synthesis technique. The evaluation experiments demonstrate that the proposed system can achieve a higher recognition rate at a lower running cost comparing to the reference implementations.

Modality (human–computer interaction)[ INFO.INFO-TS ] Computer Science [cs]/Signal and Image Processingbusiness.industryComputer science[INFO.INFO-TS] Computer Science [cs]/Signal and Image Processing020208 electrical & electronic engineeringFeature extractionMultispectral image[INFO.INFO-CV]Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]02 engineering and technology[ INFO.INFO-CV ] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV]Identification (information)[INFO.INFO-CV] Computer Science [cs]/Computer Vision and Pattern Recognition [cs.CV][INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingPartial least squares regression0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingComputer visionAlgorithm designArtificial intelligencebusinessComputingMilieux_MISCELLANEOUS
researchProduct

ATL model checking in the cloud

2015

This paper gives an overview of our recent work on implementing a new interactive ATL model checker for verification of open systems. In verification based on model checking, we need to provide a model of the system and also write down the properties (ATL formulas) that we require the system to satisfy. Traditionally, the semantics of ATL is given in terms of concurrent game structures. In contrast to previous approaches, our tool permits an interactive design of the ATL models as state-transition graphs, and is based on client/server architecture. The server part, published as Web service in OpenShift cloud platform, embeds the core of the ATL model checker, and the client provides an intu…

Model checkingSQLProgramming languagebusiness.industrySemantics (computer science)Computer scienceInteractive designCloud computingcomputer.software_genreTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESOperating systemAlgorithm designWeb servicebusinesscomputercomputer.programming_languageGraphical user interface2015 Internet Technologies and Applications (ITA)
researchProduct

Bandwidth Resource Management for Neural Signal Telemetry

2009

Recent advances in modern neurocomputing have shown the utmost necessity of wireless communication systems that allow real-time (RT) monitoring of neural signals meeting several requirements such as source compression and high fidelity of the received signal. Neural recordings require multielectrode probes with up to hundreds of electrodes and transmission of signals wirelessly over a limited bandwidth (BW). In this paper, a RT resource management algorithm is proposed so that adequate source compression is applied to each channel in order to fit them into the available BW. Performance of the algorithm is analyzed using dynamically changing BW and neural recordings with different neural act…

NeuronsComputer scienceModels NeurologicalReal-time computingSignal Processing Computer-AssistedGeneral MedicineSignalRatsComputer Science ApplicationsBandwidth allocationTransmission (telecommunications)Bandwidth (computing)AnimalsTelemetryResource allocationAlgorithm designElectrical and Electronic EngineeringAlgorithmsCells CulturedMonitoring PhysiologicBiotechnologyData compressionCommunication channelIEEE Transactions on Information Technology in Biomedicine
researchProduct

A Bayesian Learning Automaton for Solving Two-Armed Bernoulli Bandit Problems

2008

The two-armed Bernoulli bandit (TABB) problem is a classical optimization problem where an agent sequentially pulls one of two arms attached to a gambling machine, with each pull resulting either in a reward or a penalty. The reward probabilities of each arm are unknown, and thus one must balance between exploiting existing knowledge about the arms, and obtaining new information. In the last decades, several computationally efficient algorithms for tackling this problem have emerged, with learning automata (LA) being known for their ?-optimality, and confidence interval based for logarithmically growing regret. Applications include treatment selection in clinical trials, route selection in …

Optimization problemLearning automatabusiness.industryComputer scienceMaximum likelihoodBayesian probabilitySampling (statistics)RegretBayesian inferenceConfidence intervalAutomatonAlgorithm designArtificial intelligencebusinessBeta distribution2008 Seventh International Conference on Machine Learning and Applications
researchProduct

Greedy and K-Greedy algoritmhs for multidimensional data association

2011

[EN] The multidimensional assignment (MDA) problem is a combinatorial optimization problem arising in many applications, for instance multitarget tracking (MTT). The objective of an MDA problem of dimension $d\in\Bbb{N}$ is to match groups of $d$ objects in such a way that each measurement is associated with at most one track and each track is associated with at most one measurement from each list, optimizing a certain objective function. It is well known that the MDA problem is NP-hard for $d\geq3$. In this paper five new polynomial time heuristics to solve the MDA problem arising in MTT are presented. They are all based on the semi-greedy approach introduced in earlier research. Experimen…

OptimizationMathematical optimizationCombinatorial optimizationPolynomial approximationESTADISTICA E INVESTIGACION OPERATIVAAerospace EngineeringApproximation algorithmNP-hardSensor fusionDimension (vector space)Combinatorial optimization problemsMulti-target trackingPolynomial time heuristicsCombinatorial optimizationAlgorithm designElectrical and Electronic EngineeringMultidimensional assignmentObjective functionsHeuristicsGreedy algorithmTime complexityAlgorithmMultidimensional dataAlgorithmsMathematics
researchProduct