Search results for "Hard"

showing 10 items of 2294 documents

SAUCE: A web application for interactive teaching and learning of parallel programming

2017

Abstract Prevalent hardware trends towards parallel architectures and algorithms create a growing demand for graduate students familiar with the programming of concurrent software. However, learning parallel programming is challenging due to complex communication and memory access patterns as well as the avoidance of common pitfalls such as dead-locks and race conditions. Hence, the learning process has to be supported by adequate software solutions in order to enable future computer scientists and engineers to write robust and efficient code. This paper discusses a selection of well-known parallel algorithms based on C++11 threads, OpenMP, MPI, and CUDA that can be interactively embedded i…

Computer Networks and Communicationsbusiness.industryComputer scienceProgramming languageWhite-box testingParallel algorithmProcess (computing)020206 networking & telecommunications02 engineering and technologyParallel computingThread (computing)computer.software_genreTheoretical Computer ScienceCUDASoftwareArtificial IntelligenceHardware and Architecture0202 electrical engineering electronic engineering information engineeringCode (cryptography)Web application020201 artificial intelligence & image processingbusinesscomputerSoftwareJournal of Parallel and Distributed Computing
researchProduct

A low power and high resolution data logger for submarine seismic monitoring

2010

The design, implementation and characterization of a digital waveform recorder for ocean bottom seismic monitoring is here reported. The system is capable of synchronously acquiring, and logging on a flash memory bank, four high resolution signals. Thanks to a very careful design of the system architecture and by using robust digital signal processing techniques, two main conflicting issues have been addressed: a high dynamic range, better than 120 dB, usually obtained with high energy demanding converters, and a power consumption as low as 250 mW, hence allowing to easily increase the time of a continuous submarine monitoring session up to 3 months.

Computer Networks and Communicationsbusiness.industryComputer scienceSubmarineDigital filteringSettore ING-INF/01 - ElettronicaArtificial IntelligenceHardware and ArchitectureData loggerLow powerHigh resolution data acquisitionWaveformbusinessEmbedded systemSoftwareDigital signal processingComputer hardwareSeismic recording
researchProduct

Analyzing the performance of a cluster-based architecture for immersive visualization systems

2008

Cluster computing has become an essential issue for designing immersive visualization systems. This paradigm employs scalable clusters of commodity computers with much lower costs than would be possible with the high-end, shared memory computers that have been traditionally used for virtual reality purposes. This change in the design of virtual reality systems has caused some development environments oriented toward shared memory computing to require modifications to their internal architectures in order to support cluster computing. This is the case of VR Juggler, which is considered one of the most important virtual reality application development frameworks based on open source code. Thi…

Computer Networks and Communicationsbusiness.industryComputer scienceVirtual realityModular designcomputer.software_genreTheoretical Computer ScienceVisualizationShared memoryArtificial IntelligenceHardware and ArchitectureHuman–computer interactionComputer clusterScalabilityCluster (physics)Operating systemArchitecturebusinesscomputerSoftwareJournal of Parallel and Distributed Computing
researchProduct

A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography

2015

International audience; Wireless sensor networks (WSNs) are nowadays considered as an important part of the Internet of Things (IoT). In these networks, data aggregation plays an essential role in energy preservation. However, WSNs are usually deployed in hostile and unattended environments (e.g. military applications) in which the confidentiality and integrity security services are widely desired. Recently, homomorphic encryptions have been applied to conceal sensitive information during aggregation such that algebraic operations are done directly on ciphertexts without decryption. The main benefit is that they offer the end-to-end data confidentiality and they do not require expensive com…

Computer Networks and Communicationsbusiness.industryComputer scienceWireless sensor networks WSNsSimple power analysisSecure data aggregationHomomorphic encryptionCryptographyEncryptionHomomorphic encryptionPublic-key cryptography[SPI]Engineering Sciences [physics]Key distribution in wireless sensor networksStateful firewallHardware and ArchitectureOverhead (computing)businessSecurity levelWireless sensor networkSoftwareComputer networkAd Hoc Networks
researchProduct

An efficient hardware implementation of MQ decoder of the JPEG2000

2014

Abstract JPEG2000 is an international standard for still images intended to overcome the shortcomings of the existing JPEG standard. Compared to JPEG image compression techniques, JPEG2000 standard has not only better not only has better compression ratios, but it also offers some exciting features. As it’s hard to meet the real-time requirement of image compression systems by software, it is necessary to implement compression system by hardware. The MQ decoder of the JPEG2000 standard is an important bottleneck for real-time applications. In order to meet the real-time requirement we propose in this paper a novel architecture for a MQ decoder with high throughput which is comparable to tha…

Computer Networks and Communicationsbusiness.industryComputer sciencecomputer.file_formatFrame rateJPEGArtificial IntelligenceHardware and ArchitectureEmbedded systemJPEG 2000StratixOverhead (computing)businessField-programmable gate arraycomputerThroughput (business)SoftwareComputer hardwareImage compressionMicroprocessors and Microsystems
researchProduct

Dual-model approach for safety-critical embedded systems

2020

Abstract The paper presents the design of digital controllers based on two models: the Petri net model, and the UML state machine. These two approaches differ in many aspects of design flow, such as conceptual modelling, and analysis and synthesis. Each of these approaches can be used individually to design an efficient logic controller, and such solutions are well-known, but their interoperability can contribute to a much better understanding of logic controller design and validation. This is especially important in the case of safety- or life-critical embedded systems, and apart from this, a dual-model controller design can make up redundant system increasing its reliability.

Computer Networks and Communicationsbusiness.industryDual modelComputer scienceReliability (computer networking)020208 electrical & electronic engineeringInteroperabilityDesign flow02 engineering and technologyPetri net020202 computer hardware & architectureUML state machineArtificial IntelligenceHardware and ArchitectureControl theoryEmbedded system0202 electrical engineering electronic engineering information engineeringbusinessSoftwareMicroprocessors and Microsystems
researchProduct

Efficient information gathering from large wireless sensor networks

2018

Abstract Considering large WSNs and comparing data aggregation approaches in terms of scalability, robustness, completeness, and time/energy effectiveness, recent research has asserted the superiority of serial structure-free approaches over serial structure-based ones, and over both parallel structure-free and parallel structure-based techniques. But, in spite of the fact that serial structure-free approaches excel in large and medium-scale networks, their underlying path-construction algorithms are not optimal and can be improved by reducing the involved communications and further shortening the visiting path. To respond to this need, this paper presents Geometric Serial Search (GSS); a n…

Computer Networks and Communicationsbusiness.industryNetwork packetComputer science020206 networking & telecommunications02 engineering and technology020202 computer hardware & architectureRobustness (computer science)Scalability0202 electrical engineering electronic engineering information engineeringWirelessbusinessWireless sensor networkComputer networkComputer Communications
researchProduct

A Predictive Approach for the Efficient Distribution of Agent-Based Systems on a Hybrid-Cloud

2018

International audience; Hybrid clouds are increasingly used to outsource non-critical applications to public clouds. However, the main challenge within such environments, is to ensure a cost-efficient distribution of the systems between the resources that are on/off premises. For Multi Agent Systems (MAS), this challenge is deepened due to irregular workload progress and intensive communication between the agents, which may result in high computing and data transfer costs. Thus, in this paper we propose a generic framework for adaptive cost-efficient deployment of MAS with a special focus on hybrid clouds. The framework is based mainly on the use of a performance evaluation process that con…

Computer Networks and Communicationsbusiness.industryProcess (engineering)Computer scienceAgent-Based SystemDistributed computingMulti-agent systemDeployment020206 networking & telecommunicationsCloud computingWorkload02 engineering and technologyOutsourcingHardware and ArchitectureSoftware deployment[INFO.INFO-MA]Computer Science [cs]/Multiagent Systems [cs.MA]Prediction ProcessGraph partitioning algorithm0202 electrical engineering electronic engineering information engineering020201 artificial intelligence & image processingMetricsState (computer science)Hybrid CloudbusinessSoftware
researchProduct

An efficient distributed algorithm for generating and updating multicast trees

2006

As group applications are becoming widespread, efficient network utilization becomes a growing concern. Multicast transmission represents a necessary lower network service for the wide diffusion of new multimedia network applications. Multicast transmission may use network resources more efficiently than multiple point-to-point messages; however, creating optimal multicast trees (Steiner Tree Problem in networks) is prohibitively expensive. This paper proposes a distributed algorithm for the heuristic solution of the Steiner Tree Problem, allowing the construction of effective distribution trees using a coordination protocol among the network nodes. Furthermore, we propose a novel distribut…

Computer Networks and Communicationscomputer.internet_protocolComputer scienceDistributed computingNetwork ontology.Distance Vector Multicast Routing ProtocolMultimedia Broadcast Multicast ServiceSteiner tree problemTheoretical Computer Sciencesymbols.namesakeArtificial IntelligenceConvergence (routing)Multicast addressXcastCommunication complexityPragmatic General MulticastIntelligent systemSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniMulticast transmissionProtocol Independent MulticastMulticastInter-domainbusiness.industryNode (networking)Programmable networkComputer Graphics and Computer-Aided DesignSource-specific multicastHardware and ArchitectureDistributed algorithmNetwork serviceReliable multicastsymbolsSituation calculuIP multicastbusinesscomputerSoftwareComputer networkParallel Computing
researchProduct

Assessment of the Current for a Non-Linear Power Inductor Including Temperature in DC-DC Converters

2023

A method for estimating the current flowing through a non-linear power inductor operating in a DC/DC converter is proposed. The knowledge of such current, that cannot be calculated in closed form as for the linear inductor, is crucial for the design of the converter. The proposed method is based on a third-order polynomial model of the inductor, already developed by the authors; it is exploited to solve the differential equation of the inductor and to implement a flux model in a circuit simulator. The method allows the estimation of the current up to saturation, intended as the point at which the differential inductance is reduced to half of its maximum value. The current profile depends al…

Computer Networks and Communicationsinductorsmagnetic coresnonlinear circuitsnonlinear network analysialgorithmsinductorSettore ING-INF/01 - ElettronicaAlgorithmmagnetic corenumerical simulationsferriteHardware and ArchitectureControl and Systems Engineeringnonlinear network analysisSignal ProcessingElectrical and Electronic Engineeringnonlinear circuitferritesElectronics
researchProduct