Search results for "Algorithm design"

showing 10 items of 63 documents

Design of an image processing integrated circuit for real time edge detection

2003

Presents the design of a real time image processing micro-system to detect defects on manufacturing products. The analysis method is based on an edge detection algorithm (differential operators) to select the information related to the structure of the objects present in the image. The edge calculation function has been integrated in a standard cell circuit using a CMOS 1.5 mu m process. The ASIC has been implemented and tested in an image processing microsystem with a CCD camera. Results show an improvement of performances (speed, noise, size reduction system characterization, etc. . .) in comparison with the first prototypes (software implementation and printed board with standard compone…

Standard cellEngineeringbusiness.industryNoise (signal processing)Image processingIntegrated circuitEdge detectionlaw.inventionApplication-specific integrated circuitlawMicrosystemElectronic engineeringAlgorithm designbusinessProceedings Euro ASIC '92
researchProduct

Optimal gossip algorithm for distributed consensus SVM training in wireless sensor networks

2009

In this paper, we consider the distributed training of a SVM using measurements collected by the nodes of aWireless Sensor Network in order to achieve global consensus with the minimum possible inter-node communications for data exchange. We derive a novel mathematical characterization for the optimal selection of partial information that neighboring sensors should exchange in order to achieve consensus in the network. We provide a selection function which ranks the training vectors in order of importance in the learning process. The amount of information exchange can vary, based on an appropriately chosen threshold value of this selection function, providing a desired trade-off between cla…

Support vector machineStatistical classificationConsensusDistributed algorithmComputer scienceAlgorithm designData miningcomputer.software_genreWireless sensor networkcomputerInformation exchangeFusion center2009 16th International Conference on Digital Signal Processing
researchProduct

Optimal Configuration for N-Dimensional Twin Torus Networks

2014

Torus topology is one of the most common topologies used in the current largest supercomputers. Although 3D torus is widely used, recently some supercomputers in the Top500 list have been built using networks with topologies of five or six dimensions. To obtain an nD torus, 2n ports per node are needed. These ports can be offered by a single or several cards per node. In the second case, there are multiple ways of assigning the dimension and direction of the card ports. In a previous work we proposed the 3D Twin (3DT) torus which uses two 4-port cards per node, and obtained the optimal port configuration. This paper extends and generalizes that work in order to obtain the optimal port confi…

TOP500ComputerSystemsOrganization_COMPUTERSYSTEMIMPLEMENTATIONComputer scienceDimension (graph theory)Node (circuits)Topology (electrical circuits)Algorithm designTorusParallel computingRouting (electronic design automation)Network topologyTopologyComputer Science::Operating Systems2014 IEEE 13th International Symposium on Network Computing and Applications
researchProduct

A probabilistic condensed representation of data for stream mining

2014

Data mining and machine learning algorithms usually operate directly on the data. However, if the data is not available at once or consists of billions of instances, these algorithms easily become infeasible with respect to memory and run-time concerns. As a solution to this problem, we propose a framework, called MiDEO (Mining Density Estimates inferred Online), in which algorithms are designed to operate on a condensed representation of the data. In particular, we propose to use density estimates, which are able to represent billions of instances in a compact form and can be updated when new instances arrive. As an example for an algorithm that operates on density estimates, we consider t…

Task (computing)Association rule learningData stream miningSimple (abstract algebra)Computer scienceProbabilistic logicProbabilistic analysis of algorithmsAlgorithm designData miningRepresentation (mathematics)computer.software_genrecomputer2014 International Conference on Data Science and Advanced Analytics (DSAA)
researchProduct

An improved quantum query algorithm for computing AND Boolean function

2010

We consider the quantum query model for computing Boolean functions. The definition of the function is known, but a black box contains the input X = (x 1 , x 2 , …, x n ). Black box can be accessed by querying x i values. The goal is to develop an algorithm, which would compute the function value for arbitrary input using as few queries to the black box as possible. We present two different quantum query algorithms for computing the basic Boolean function — logical AND of two bits. Both algorithms use only one query to determine the function value. Correct answer probability for the first algorithm is 80%, but for the second algorithm it is 90%. To compute this function with the same probab…

Theoretical computer scienceComputational complexity theoryLogical conjunctionBlack boxGrover's algorithmAlgorithm designFunction (mathematics)Boolean functionAlgorithmComputer Science::DatabasesQuantum computerMathematicsIEEE Congress on Evolutionary Computation
researchProduct

CN2-R: Faster CN2 with randomly generated complexes

2011

Among the rule induction algorithms, the classic CN2 is still one of the most popular ones; a great amount of enhancements and improvements to it is to witness this. Despite the growing computing capacities since the algorithm was proposed, one of the main issues is resource demand. The proposed modification, CN2-R, substitutes the star concept of the original algorithm with a technique of randomly generated complexes in order to substantially improve on running times without significant loss in accuracy.

Weighted Majority AlgorithmTheoretical computer scienceRule inductionComputer sciencePopulation-based incremental learningStability (learning theory)Online machine learningProbabilistic analysis of algorithmsAlgorithm designStar (graph theory)Algorithm2011 16th International Conference on Methods & Models in Automation & Robotics
researchProduct

Overlapping community detection versus ground-truth in AMAZON co-purchasing network

2015

International audience; Objective evaluation of community detection algorithms is a strategic issue. Indeed, we need to verify that the communities identified are actually the good ones. Moreover, it is necessary to compare results between two distinct algorithms to determine which is most effective. Classically, validations rely on clustering comparison measures or on quality metrics. Although, various traditional performance measures are used extensively. It appears very clearly that they cannot distinguish community structures with different topological properties. It is therefore necessary to propose an alternative methodology more sensitive to the community structure variations in orde…

[ INFO ] Computer Science [cs]Computer sciencemedia_common.quotation_subject02 engineering and technologycomputer.software_genreMachine learning01 natural sciencesClique percolation method010104 statistics & probability[SPI]Engineering Sciences [physics][ SPI ] Engineering Sciences [physics]0202 electrical engineering electronic engineering information engineeringQuality (business)[INFO]Computer Science [cs]0101 mathematicsCluster analysisnetwork analysismedia_commonGround truthoverlapping community networksbusiness.industryCommunity structurePurchasing[ SPI.TRON ] Engineering Sciences [physics]/ElectronicsCommunity structure[SPI.TRON]Engineering Sciences [physics]/Electronicsdetection algorithmsoverlap- ping community networks020201 artificial intelligence & image processingAlgorithm designArtificial intelligenceData miningbusinesscomputerNetwork analysis
researchProduct

A Robust Multi Stage Technique for Image Binarization of Degraded Historical Documents

2017

International audience; Document image binarization is a central problem in many document analysis systems. Indeed, it represents one of the basic challenges, especially in case of historical documents analysis. In this paper, we propose a novel robust multi stage framework that combines different existing document image thresholding methods for the purpose of getting a better binarization result. CLAHE technique is introduced to significantly enhance contrast in some poor images. The proposed method then uses a hybrid algorithm to partition image into foreground and background. A special procedure is finally applied in order to remove small noise and correct characters morphology. Experime…

adaptive thresholdingComputer scienceHistorical document image analysis[SPI] Engineering Sciences [physics]ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION02 engineering and technologyhybrid algorithm01 natural sciencesGrayscaleElectronic mail010309 optics[SPI]Engineering Sciences [physics]Histogram0103 physical sciences0202 electrical engineering electronic engineering information engineeringNoise measurementbusiness.industryPattern recognitionImage segmentationglobal thresholdingThresholding[SPI.TRON] Engineering Sciences [physics]/Electronics[SPI.TRON]Engineering Sciences [physics]/ElectronicsComputingMethodologies_DOCUMENTANDTEXTPROCESSINGcontrast enhancement020201 artificial intelligence & image processingAlgorithm designAdaptive histogram equalizationArtificial intelligencebusiness
researchProduct

A fast algorithm for the exhaustive analysis of 12-nucleotide-long DNA sequences. Applications to human genomics

2004

We have developed a new algorithm that allows the exhaustive determination of words of up to 12 nucleotides in DNA sequences. It is fast enough as to be used at a genomic scale running on a standard personal computer. As an example, we apply the algorithm to compare the number of all 12-nucleotide long words in human chromosomes 21 and 22, each of them more than 33 million nucleotides long. Sequences that are chromosome specific are detected in less than 2 minutes, being analyzed any pair of chromosomes at a rate of 45 millions of nucleotides (45 Mb) per minute. The size of the words is long enough as to allow further analyses of all significant sequences using conventional database searche…

chemistry.chemical_classificationTheoretical computer scienceComputer scienceParallel algorithmChromosomeGenomicsHuman genomicsComputational biologyDNA sequencingchemistry.chemical_compoundchemistryTandem repeatCoding regionAlgorithm designNucleotideGeneDNAProceedings International Parallel and Distributed Processing Symposium
researchProduct

Col : A Data Collection Protocol for Vanet

2012

International audience; In this paper, we present a protocol to collect data within a vehicular ad hoc network (VANET). In spite of the intrinsic dynamic of such network, our protocol simultaneously offers three relevant properties: (1) It allows any vehicle to collect data beyond its direct neighborhood (i.e., vehicles within direct communication range) using vehicle-to-vehicle communications only (i.e., the infrastructure is not required); (2) It tolerates possible network partitions; (3) It works on demand and stops when the data collection is achieved. To the best of our knowledge, this is the first collect protocol having these three characteristics. All that is chiefly obtained thanks…

data collection protocolVehicular communication systemsVANETCorrectnessnetwork operator antComputer sciencedata acquisitionDistributed computing[ INFO.INFO-NI ] Computer Science [cs]/Networking and Internet Architecture [cs.NI]self-stabilization area02 engineering and technologyVehicle dynamics[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI]Transient analysis[SPI]Engineering Sciences [physics]0203 mechanical engineeringvehicular ad hoc networkvehicle to vehicle communication0202 electrical engineering electronic engineering information engineeringAlgorithm design and analysisHeuristic algorithmsCOL algorithmProtocol (object-oriented programming)ComputingMilieux_MISCELLANEOUSAirplug software distributionVehicular ad hoc networkData collectionbusiness.industryNetwork partitionnetwork partition020206 networking & telecommunications020302 automobile design & engineeringVehiclesSoftware distributionRoadsAlgorithm designvehicular ad hoc networksbusinessProtocolsComputer network
researchProduct