Search results for "complexi"

showing 10 items of 1116 documents

Moving Learning Machine Towards Fast Real-Time Applications: A High-Speed FPGA-based Implementation of the OS-ELM Training Algorithm

2018

Currently, there are some emerging online learning applications handling data streams in real-time. The On-line Sequential Extreme Learning Machine (OS-ELM) has been successfully used in real-time condition prediction applications because of its good generalization performance at an extreme learning speed, but the number of trainings by a second (training frequency) achieved in these continuous learning applications has to be further reduced. This paper proposes a performance-optimized implementation of the OS-ELM training algorithm when it is applied to real-time applications. In this case, the natural way of feeding the training of the neural network is one-by-one, i.e., training the neur…

Computer Networks and CommunicationsComputer scienceReal-time computingParameterized complexitylcsh:TK7800-836002 engineering and technologyextreme learning machine0202 electrical engineering electronic engineering information engineeringSensitivity (control systems)Electrical and Electronic EngineeringEnginyeria d'ordinadorsField-programmable gate arrayFPGAExtreme learning machineEnginyeria elèctricaArtificial neural networkData stream mininglcsh:Electronics020206 networking & telecommunicationsOS-ELMreal-time learningHardware and ArchitectureControl and Systems Engineeringon-chip trainingSignal Processingon-line learning020201 artificial intelligence & image processingDistributed memoryonline sequential ELMhardware implementationAlgorithm
researchProduct

An efficient distributed algorithm for generating and updating multicast trees

2006

As group applications are becoming widespread, efficient network utilization becomes a growing concern. Multicast transmission represents a necessary lower network service for the wide diffusion of new multimedia network applications. Multicast transmission may use network resources more efficiently than multiple point-to-point messages; however, creating optimal multicast trees (Steiner Tree Problem in networks) is prohibitively expensive. This paper proposes a distributed algorithm for the heuristic solution of the Steiner Tree Problem, allowing the construction of effective distribution trees using a coordination protocol among the network nodes. Furthermore, we propose a novel distribut…

Computer Networks and Communicationscomputer.internet_protocolComputer scienceDistributed computingNetwork ontology.Distance Vector Multicast Routing ProtocolMultimedia Broadcast Multicast ServiceSteiner tree problemTheoretical Computer Sciencesymbols.namesakeArtificial IntelligenceConvergence (routing)Multicast addressXcastCommunication complexityPragmatic General MulticastIntelligent systemSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazioniMulticast transmissionProtocol Independent MulticastMulticastInter-domainbusiness.industryNode (networking)Programmable networkComputer Graphics and Computer-Aided DesignSource-specific multicastHardware and ArchitectureDistributed algorithmNetwork serviceReliable multicastsymbolsSituation calculuIP multicastbusinesscomputerSoftwareComputer networkParallel Computing
researchProduct

New separation between $s(f)$ and $bs(f)$

2011

In this note we give a new separation between sensitivity and block sensitivity of Boolean functions: $bs(f)=(2/3)s(f)^2-(1/3)s(f)$.

Computer Science - Computational Complexity
researchProduct

A Tight Lower Bound on Certificate Complexity in Terms of Block Sensitivity and Sensitivity

2014

Sensitivity, certificate complexity and block sensitivity are widely used Boolean function complexity measures. A longstanding open problem, proposed by Nisan and Szegedy, is whether sensitivity and block sensitivity are polynomially related. Motivated by the constructions of functions which achieve the largest known separations, we study the relation between 1-certificate complexity and 0-sensitivity and 0-block sensitivity. Previously the best known lower bound was $C_1(f)\geq \frac{bs_0(f)}{2 s_0(f)}$, achieved by Kenyon and Kutin. We improve this to $C_1(f)\geq \frac{3 bs_0(f)}{2 s_0(f)}$. While this improvement is only by a constant factor, this is quite important, as it precludes achi…

Computer Science - Computational Complexity
researchProduct

Computational Complexity and Communication: Coordination in Two-Player Games

2002

The main contribution of this paper is the development and application of cryptographic techniques to the design of strategic communication mechanisms. One of the main assumptions in cryptography is the limitation of the computational power available to agents. We introduce the concept of limited computational complexity, and by borrowing results from cryptography, we construct a communication protocol to establish that every correlated equilibrium of a two-person game with rational payoffs can be achieved by means of computationally restricted unmediated communication. This result provides an example in game theory where limitations of computational abilities of players are helpful in solv…

Computer Science::Computer Science and Game TheoryEconomics and EconometricsCorrelated equilibriumTheoretical computer scienceComputational complexity theorybusiness.industryCryptographyComputational resourceTuring machinesymbols.namesakeNash equilibriumsymbolsbusinessCommunications protocolGame theoryAlgorithmMathematicsEconometrica
researchProduct

The absolute center of a unicyclic network

1989

Abstract A unicyclic network is one generalization of a tree network. In this paper we examine the problem of finding an absolute center of a unicyclic network. We show that this problem can be solved in linear time with respect to the number of vertices in the network.

Computer Science::RoboticsCombinatoricsMathematics::CombinatoricsAbsolute (philosophy)Computer Science::Discrete MathematicsGeneralizationApplied MathematicsTree networkDiscrete Mathematics and CombinatoricsCenter (algebra and category theory)Time complexityMathematicsDiscrete Applied Mathematics
researchProduct

Using FOCAP tool for teaching microarchitecture simulation and optimization

2013

This paper presents our new developed FOCAP tool (Framework for optimizing the Computer Architecture Performance) in order to gain a better understanding and familiarity of the students with new advanced learning methods and tools in the Microarchitecture Simulation and Optimization. At this stage, FOCAP allows a mono-objective automatic design space exploration (DSE) of a superscalar processor by varying several architectural parameters. Such DSE tools are very useful, since it is impossible to simulate all the configurations of a highly parameterized microarchitecture. Therefore, heuristic methods, local search algorithms and advanced machine learning methods are good candidates to find n…

Computer architecturebusiness.industryDesign space explorationComputer scienceHeuristic (computer science)SuperscalarParameterized complexityLocal search (optimization)businessSoftware engineeringDesign spaceField (computer science)Microarchitecture2013 17th International Conference on System Theory, Control and Computing (ICSTCC)
researchProduct

Effect of Demand Side Management on the Operation of PV-Integrated Distribution Systems

2020

In this new era of high electrical energy dependency, electrical energy must be abundant and reliable, thus smart grids are conducted to deliver load demands. Hence, smart grids are implemented alongside distributed generation of renewable energies to increase the reliability and controllability of the grid, but, with the very volatile nature of the Distributed Generation (DG), Demand Side Management (DSM) helps monitor and control the load shape of the consumed power. The interaction of DSM with the grid provides a wide range of mutual benefits to the user, the utility and the market. DSM methodologies such as Conservation Voltage Reduction (CVR) and Direct Load Control (DLC) collaborate i…

Computer science020209 energyReliability (computer networking)conservation voltage reductiondistribution systems02 engineering and technologylcsh:TechnologyReduction (complexity)lcsh:Chemistry0202 electrical engineering electronic engineering information engineeringGeneral Materials ScienceInstrumentationlcsh:QH301-705.5distribution systemFluid Flow and Transfer Processesdistributed generationdemand side managementVoltage reductionbusiness.industrylcsh:TProcess Chemistry and Technology020208 electrical & electronic engineeringPhotovoltaic systemGeneral Engineeringdirect load controlGridlcsh:QC1-999Computer Science ApplicationsReliability engineeringRenewable energySettore ING-IND/33 - Sistemi Elettrici Per L'EnergiaSmart gridlcsh:Biology (General)lcsh:QD1-999lcsh:TA1-2040Distributed generationbusinesslcsh:Engineering (General). Civil engineering (General)lcsh:PhysicsApplied Sciences
researchProduct

A Novel Priority-Based Ambulance-to-Traffic Light Communication for Delay Reduction in Emergency Rescue Operations

2019

Rescue operations are very critical and sensitive. Only one-second delay could make a serious difference between life and death. Therefore, the delay in rescue operations must be reduced as much as possible. The siren signal can be used to warn other vehicles nearby the ambulance. However, it has no impact on the traffic lights, which is normally a main cause of delay in rescue operations. For this reason, many ambulances get stuck and experience long delay at the intersections, which should not happen by any means. To enhance the rescue operations, this paper proposes a novel Priority-based Ambulance-to-Traffic Light Communication (PATCom). PATCom allows information exchanging between traf…

Computer science020302 automobile design & engineering020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreEmergency rescuelaw.inventionReduction (complexity)Traffic signal0203 mechanical engineeringlawOn demand0202 electrical engineering electronic engineering information engineeringEvaluation resultStop timeSiren (alarm)Intelligent transportation systemcomputer2019 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM)
researchProduct

Approximate 3-Dimensional Electrical Impedance Imaging

2001

We discuss a new approach to three-dimensional electrical impedance imaging based on a reduction of the information to be demanded from a reconstruction algorithm. Images are obtained from a single measurement by suitably simplifying the geometry of the measuring chamber and by restricting the nature of the object to be imaged and the information required from the image. In particular we seek to establish the existence or non-existence of a single object (or a small number of objects) in a homogeneous background and the location of the former in the (x,y)-plane defined by the measuring electrodes. Given in addition the conductivity of the object rough estimates of its position along the z-a…

Computer scienceAcousticsSingle measurementGeneral Physics and AstronomyFOS: Physical sciencesReconstruction algorithmComputational Physics (physics.comp-ph)Object (computer science)Electrical impedance imagingPhysics - Medical PhysicsImage (mathematics)Reduction (complexity)HomogeneousPosition (vector)Medical Physics (physics.med-ph)Physics - Computational Physics
researchProduct