Search results for "Computational resource"

showing 9 items of 9 documents

The DrosDel Deletion Collection: A Drosophila Genomewide Chromosomal Deficiency Resource

2007

AbstractWe describe a second-generation deficiency kit for Drosophila melanogaster composed of molecularly mapped deletions on an isogenic background, covering ∼77% of the Release 5.1 genome. Using a previously reported collection of FRT-bearing P-element insertions, we have generated 655 new deletions and verified a set of 209 deletion-bearing fly stocks. In addition to deletions, we demonstrate how the P elements may also be used to generate a set of custom inversions and duplications, particularly useful for balancing difficult regions of the genome carrying haplo-insufficient loci. We describe a simple computational resource that facilitates selection of appropriate elements for generat…

Chromosome AberrationsGeneticsGenomebiologyMolecular Sequence DataInvestigationsbiology.organism_classificationComputational resourceGenomeSet (abstract data type)Drosophila melanogasterDNA Transposable ElementsDNA Transposable ElementsGeneticsAnimalsDrosophila melanogasterDrosophilaSelection (genetic algorithm)Sequence DeletionGenetics
researchProduct

Computational Complexity and Communication: Coordination in Two-Player Games

2002

The main contribution of this paper is the development and application of cryptographic techniques to the design of strategic communication mechanisms. One of the main assumptions in cryptography is the limitation of the computational power available to agents. We introduce the concept of limited computational complexity, and by borrowing results from cryptography, we construct a communication protocol to establish that every correlated equilibrium of a two-person game with rational payoffs can be achieved by means of computationally restricted unmediated communication. This result provides an example in game theory where limitations of computational abilities of players are helpful in solv…

Computer Science::Computer Science and Game TheoryEconomics and EconometricsCorrelated equilibriumTheoretical computer scienceComputational complexity theorybusiness.industryCryptographyComputational resourceTuring machinesymbols.namesakeNash equilibriumsymbolsbusinessCommunications protocolGame theoryAlgorithmMathematicsEconometrica
researchProduct

Dynamic Resource Allocation and Computation Offloading for Edge Computing System

2020

In this work, we propose a dynamic optimization scheme for an edge computing system with multiple users, where the radio and computational resources, and offloading decisions, can be dynamically allocated with the variation of computation demands, radio channels and the computation resources. Specifically, with the objective to minimize the energy consumption of the considered system, we propose a joint computation offloading, radio and computational resource allocation algorithm based on Lyapunov optimization. Through minimizing the derived upper bound of the Lyapunov drift-plus-penalty function, the main problem is divided into several sub-problems at each time slot and are addressed sepa…

Lyapunov functionMathematical optimizationComputer scienceComputation020206 networking & telecommunicationsLyapunov optimizationEdge computing02 engineering and technologyEnergy consumptionDynamic computation offloadingComputational resourcesymbols.namesake0202 electrical engineering electronic engineering information engineeringsymbolsResource allocationComputation offloadingSDG 7 - Affordable and Clean EnergyResource allocationLyapunov optimizationEdge computing
researchProduct

BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid

2011

In smart grid, phaser measurement units (PMUs) can upload readings to utility centers via supervisory control and data acquisition (SCADA) or energy management system (EMS) to enable intelligent controlling and scheduling. It is critical to maintain the secrecy of readings so as to protect customers' privacy, together with integrity and source authentication for the reliability and stability of power scheduling. In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. In this paper, we propose a family of schemes to solve this p…

PasswordSecurity analysisArticle SubjectComputer sciencebusiness.industryCommunicationHash functionComputerApplications_COMPUTERSINOTHERSYSTEMSCryptographic protocolComputational resourcelcsh:TelecommunicationPublic-key cryptographySmart gridSCADAlcsh:TK5101-6720Media TechnologyElectrical and Electronic EngineeringbusinessComputer networkInternational Journal of Digital Multimedia Broadcasting
researchProduct

A Novel Computational Approach for Harmonic Mitigation in PV Systems with Single-Phase Five-Level CHBMI

2018

In this paper, a novel approach to low order harmonic mitigation in fundamental switching frequency modulation is proposed for high power photovoltaic (PV) applications, without trying to solve the cumbersome non-linear transcendental equations. The proposed method allows for mitigation of the first-five harmonics (third, fifth, seventh, ninth, and eleventh harmonics), to reduce the complexity of the required procedure and to allocate few computational resource in the Field Programmable Gate Array (FPGA) based control board. Therefore, the voltage waveform taken into account is different respect traditional voltage waveform. The same concept, known as “voltage cancelation”, used for single-…

PolynomialControl and OptimizationTranscendental equationComputer science020209 energyEnergy Engineering and Power Technologysoft switching02 engineering and technologySettore ING-IND/32 - Convertitori Macchine E Azionamenti ElettriciComputational resourcelcsh:Technology7. Clean energyselective harmonic mitigationmultilevel power converter0202 electrical engineering electronic engineering information engineeringElectronic engineeringWaveformElectrical and Electronic EngineeringEngineering (miscellaneous)Photovoltaic systemlcsh:TRenewable Energy Sustainability and the EnvironmentPhotovoltaic systemPower (physics)phase shiftedSettore ING-IND/31 - ElettrotecnicaHarmonicsphotovoltaic systemsvoltage cancellationEnergy (miscellaneous)VoltageEnergies
researchProduct

Joint Radio and Computational Resource Allocation in IoT Fog Computing

2018

The current cloud-based Internet-of-Things (IoT) model has revealed great potential in offering storage and computing services to the IoT users. Fog computing, as an emerging paradigm to complement the cloud computing platform, has been proposed to extend the IoT role to the edge of the network. With fog computing, service providers can exchange the control signals with the users for specific task requirements, and offload users’ delay-sensitive tasks directly to the widely distributed fog nodes at the network edge, and thus improving user experience. So far, most existing works have focused on either the radio or computational resource allocation in the fog computing. In this work, we inve…

Service (systems architecture)IoTEdge deviceComputer Networks and CommunicationsComputer scienceDistributed computingAerospace Engineeringresource allocationCloud computing02 engineering and technologyresursointiComputational resource0203 mechanical engineeringUser experience design0202 electrical engineering electronic engineering information engineeringElectrical and Electronic Engineeringstudent project allocationmatching theoryta113ta213business.industry020302 automobile design & engineering020206 networking & telecommunicationsService providerAutomotive EngineeringResource allocationEnhanced Data Rates for GSM Evolutionfog computingbusinessIEEE Transactions on Vehicular Technology
researchProduct

An Introduction to Computational Complexity

2016

This chapter is not strictly about algebra. However, this chapter offers a set of mathematical and computational instruments that will allow us to introduce several concepts in the following chapters. Moreover, the contents of this chapter are related to algebra as they are ancillary concepts that help (and in some cases allow) the understanding of algebra.

Set (abstract data type)symbols.namesakeTheoretical computer scienceComputational complexity theoryComputer scienceAsymptotic computational complexityWorst-case complexitysymbolsComputational problemAlgebra over a fieldComputational resourceHuffman coding
researchProduct

The computational power of continuous time neural networks

1997

We investigate the computational power of continuous-time neural networks with Hopfield-type units. We prove that polynomial-size networks with saturated-linear response functions are at least as powerful as polynomially space-bounded Turing machines.

TheoryofComputation_COMPUTATIONBYABSTRACTDEVICESQuantitative Biology::Neurons and CognitionComputational complexity theoryArtificial neural networkComputer sciencebusiness.industryComputer Science::Neural and Evolutionary ComputationNSPACEComputational resourcePower (physics)Turing machinesymbols.namesakeCellular neural networksymbolsArtificial intelligenceTypes of artificial neural networksbusiness
researchProduct

Kerr Combs and Telecommunications Components for the Generation and High-Dimensional Quantum Processing of d-Level Cluster States

2019

Large and complex optical quantum states are a key resource for fundamental science and applications such as quantum communications, information processing, and metrology. In this context, cluster states are a particularly important class because they enable the realization of universal quantum computers by means of the so-called ‘one-way’ scheme, where processing operations are performed through measurements on the state. While two-level (i.e. qubit) cluster states have been realized thus far, further boosting this computational resource by increasing the number of particles comes at the price of significantly reduced coherence time and detection rates, as well as increased sensitivity to …

business.industryQuantum stateComputer scienceQubitElectronic engineeringQuantum entanglementQuantum channelPhotonicsbusinessComputational resourceQuantum information scienceQuantum computer2019 21st International Conference on Transparent Optical Networks (ICTON)
researchProduct