Search results for "computation"

showing 10 items of 7362 documents

Nvidia CUDA parallel processing of large FDTD meshes in a desktop computer

2020

The Finite Difference in Time Domain numerical (FDTD) method is a well know and mature technique in computational electrodynamics. Usually FDTD is used in the analysis of electromagnetic structures, and antennas. However still there is a high computational burden, which is a limitation for use in combination with optimization algorithms. The parallelization of FDTD to calculate in GPU is possible using Matlab and CUDA tools. For instance, the simulation of a planar array, with a three dimensional FDTD mesh 790x276x588, for 6200 time steps, takes one day -elapsed time- using the CPU of an Intel Core i3 at 2.4GHz in a personal computer, 8Gb RAM. This time is reduced 120 times when the calcula…

020203 distributed computingComputer scienceFinite-difference time-domain methodGraphics processing unit02 engineering and technologyComputational scienceCUDAPersonal computer0202 electrical engineering electronic engineering information engineeringComputational electromagnetics020201 artificial intelligence & image processingCentral processing unitTime domainMATLABcomputercomputer.programming_languageProceedings of the 10th Euro-American Conference on Telematics and Information Systems
researchProduct

WarpDrive: Massively Parallel Hashing on Multi-GPU Nodes

2018

Hash maps are among the most versatile data structures in computer science because of their compact data layout and expected constant time complexity for insertion and querying. However, associated memory access patterns during the probing phase are highly irregular resulting in strongly memory-bound implementations. Massively parallel accelerators such as CUDA-enabled GPUs may overcome this limitation by virtue of their fast video memory featuring almost one TB/s bandwidth in comparison to main memory modules of state-of-the-art CPUs with less than 100 GB/s. Unfortunately, the size of hash maps supported by existing single-GPU hashing implementations is restricted by the limited amount of …

020203 distributed computingComputer scienceHash function0102 computer and information sciences02 engineering and technologyParallel computingData structure01 natural sciencesHash tableElectronic mailMemory management010201 computation theory & mathematicsScalability0202 electrical engineering electronic engineering information engineeringMassively parallelTime complexity2018 IEEE International Parallel and Distributed Processing Symposium (IPDPS)
researchProduct

Rings for Privacy: an Architecture for Large Scale Privacy-Preserving Data Mining

2021

This article proposes a new architecture for privacy-preserving data mining based on Multi Party Computation (MPC) and secure sums. While traditional MPC approaches rely on a small number of aggregation peers replacing a centralized trusted entity, the current study puts forth a distributed solution that involves all data sources in the aggregation process, with the help of a single server for storing intermediate results. A large-scale scenario is examined and the possibility that data become inaccessible during the aggregation process is considered, a possibility that traditional schemes often neglect. Here, it is explicitly examined, as it might be provoked by intermittent network connec…

020203 distributed computingInformation privacyDistributed databasesDistributed databaseSettore ING-INF/03 - TelecomunicazioniComputer scienceReliability (computer networking)Secure Multi-Party Computation02 engineering and technologycomputer.software_genreSecret sharingData Mining; Data privacy; Distributed databases; Peer-to-peer computing; Secret sharing; Secure Multi-Party ComputationComputational Theory and MathematicsHardware and ArchitectureServerSignal Processing0202 electrical engineering electronic engineering information engineeringSecure multi-party computationData MiningData miningPeer-to-peer computingC-means data mining Privacy secret sharing secure multi-party computationSecret sharingcomputerData privacy
researchProduct

Energy Efficient Optimization for Computation Offloading in Fog Computing System

2017

In this paper, we investigate the energy efficient computation offloading scheme in a multi-user fog computing system. We consider the users need to make the decision on whether to offload the tasks to the fog node nearby, based on the energy consumption and delay constraint. In particular, we utilize queuing theory to bring a thorough study on the energy consumption and execution delay of the offloading process. Two queuing models are applied respectively to model the execution processes at the mobile device (MD) and fog node. Based on the theoretical analysis, an energy efficient optimization problem is formulated with the objective to minimize the energy consumption subjects to execution…

020203 distributed computingOptimization problemComputer sciencebusiness.industryNode (networking)Distributed computing020206 networking & telecommunicationsCloud computing02 engineering and technologyEnergy consumptionDistributed algorithm0202 electrical engineering electronic engineering information engineeringComputation offloadingbusinessMobile deviceEdge computingEfficient energy useGLOBECOM 2017 - 2017 IEEE Global Communications Conference
researchProduct

A Sequential Game Approach for Computation-Offloading in an UAV Network

2017

International audience; Small drones are currently emerging as versatile nascent technology that can be used in exploration and surveillance missions. However, most of the underlying applications require very often complex and time-consuming calculations. Although, the limited resources available onboard the small drones, their mobility, the computation delays and energy consumption make the operation of these applications very challenging. Nevertheless, computation-offloading solutions provide feasible resolves to mitigate the issues facing these constrained devices. In this context, we address in this paper the problem of offloading highly intensive computation tasks, performed by a fleet…

020203 distributed computingSequential gameComputer scienceDistributed computingBase stations020206 networking & telecommunicationsContext (language use)Computational modelingServers02 engineering and technologyEnergy consumptionBase stationsymbols.namesake[SPI]Engineering Sciences [physics]Nash equilibriumServer0202 electrical engineering electronic engineering information engineeringsymbolsOverhead (computing)Computation offloadingDelaysGamesDrones
researchProduct

FeatherCNN: Fast Inference Computation with TensorGEMM on ARM Architectures

2020

Deep Learning is ubiquitous in a wide field of applications ranging from research to industry. In comparison to time-consuming iterative training of convolutional neural networks (CNNs), inference is a relatively lightweight operation making it amenable to execution on mobile devices. Nevertheless, lower latency and higher computation efficiency are crucial to allow for complex models and prolonged battery life. Addressing the aforementioned challenges, we propose FeatherCNN – a fast inference library for ARM CPUs – targeting the performance ceiling of mobile devices. FeatherCNN employs three key techniques: 1) A highly efficient TensorGEMM (generalized matrix multiplication) routine is app…

020203 distributed computingSource codeIterative methodComputer sciencebusiness.industrymedia_common.quotation_subjectDeep learningInference02 engineering and technologyParallel computingConvolutional neural networkMatrix multiplicationARM architectureComputational Theory and MathematicsHardware and ArchitectureSignal Processing0202 electrical engineering electronic engineering information engineeringArtificial intelligencebusinessmedia_commonIEEE Transactions on Parallel and Distributed Systems
researchProduct

Usability and acceptability assessment of an empathic virtual agent to prevent major depression

2016

In Human-Computer Interaction, the adaptation of the content and the way of how this content is communicated to the users in interactive sessions is a critical issue to promote the acceptability and usability of any computational system. We present a user-adapted interactive platform to identify and provide an early intervention for symptoms of depression and suicide. In particular, we describe the work performed to assess users' system acceptability and usability. An empathic Virtual Agent is the main interface with the user, and it has been designed to generate the appropriate dialogues and emotions during the interactions according to the detected user's specific needs. This personalizat…

020205 medical informaticsPluralistic walkthroughComputer science02 engineering and technologyTheoretical Computer ScienceUsability lab03 medical and health sciences0302 clinical medicineArtificial IntelligenceHuman–computer interactionHeuristic evaluationacceptabilityemotional virtual agent0202 electrical engineering electronic engineering information engineeringAdaptation (computer science)Web usabilityInteractive systems engineeringbusiness.industryUser modelingUsabilityHuman-computer interaction030227 psychiatryuser-adapted sessionsusabilityComputational Theory and MathematicsControl and Systems EngineeringFISICA APLICADAbusiness
researchProduct

Impact of accumulated dust particles' charge on the photovoltaic module performance

2016

Abstract This work is focused on analysing effect of accumulated dust particles' charge on PV module performance. In the Dundee University's laboratory, dust particles have been created through epoxy powder and charged by using corona and tribo-electric charging methods by varying the charge levels of the accumulated dust particles. The PV module output has analysed for finding a relation between charge levels of the accumulated dust particles and its output voltage. Obtained experimental results have shown that charge level of accumulated dust particles on PV module's have significant impact on its output and dust particle accumulations are not associated with panel tilt angle.

020209 energyDust particlesAstrophysics::Cosmology and Extragalactic Astrophysics02 engineering and technology010501 environmental sciencescomplex mixtures01 natural sciencesCorona (optical phenomenon)0202 electrical engineering electronic engineering information engineeringAstrophysics::Solar and Stellar AstrophysicsElectrical and Electronic EngineeringAstrophysics::Galaxy Astrophysics0105 earth and related environmental sciencesPhysicsbusiness.industryPhotovoltaic systemElectrical engineeringCharge (physics)Condensed Matter PhysicsElectrostaticsrespiratory tract diseasesSurfaces Coatings and FilmsElectronic Optical and Magnetic MaterialsComputational physicsParticleAstrophysics::Earth and Planetary AstrophysicsbusinessBiotechnologyVoltageJournal of Electrostatics
researchProduct

Transition to turbulence in serpentine pipes

2017

Abstract The geometry considered in the present work (serpentine pipe) is a sequence of U-bends of alternate curvature. It is characterized by pipe diameter, d = 2a and bend diameter, D = 2c. The repeated curvature inversion forces the secondary flow pattern, typical of all flows in curved ducts, to switch between two mirror-like configurations. This causes (i) pressure drop and heat or mass transfer characteristics much different from those occurring either in a straight pipe or in a constant-curvature pipe, and (ii) an early loss of stability of the base steady-state flow. In the present work, four values of the curvature δ = a/c (0.2, 0.3, 0.4 and 0.5) were considered. For each value of …

020209 energyPrandtl number02 engineering and technologySerpentine pipeCondensed Matter PhysicCurvature01 natural sciences010305 fluids & plasmasPhysics::Fluid Dynamicssymbols.namesakeEngineering (all)Computational fluid dynamic0103 physical sciences0202 electrical engineering electronic engineering information engineeringSecondary flowSettore ING-IND/19 - Impianti NucleariPhysicsPressure dropTurbulenceGeneral EngineeringReynolds numberMechanicsCondensed Matter PhysicsSecondary flowTransition to turbulenceClassical mechanicsHeat fluxFlow conditioningsymbolsBifurcation
researchProduct

Applications of Evolutionary Computation

2011

EvoCOMPLEX Contributions.- Coevolutionary Dynamics of Interacting Species.- Evolving Individual Behavior in a Multi-agent Traffic Simulator.- On Modeling and Evolutionary Optimization of Nonlinearly Coupled Pedestrian Interactions.- Revising the Trade-off between the Number of Agents and Agent Intelligence.- Sexual Recombination in Self-Organizing Interaction Networks.- Symbiogenesis as a Mechanism for Building Complex Adaptive Systems: A Review.- EvoGAMES Contributions.- Co-evolution of Optimal Agents for the Alternating Offers Bargaining Game.- Fuzzy Nash-Pareto Equilibrium: Concepts and Evolutionary Detection.- An Evolutionary Approach for Solving the Rubik's Cube Incorporating Exact Met…

020301 aerospace & aeronauticsMeta-optimizationbusiness.industryComputer scienceComputer Science::Neural and Evolutionary ComputationEvolutionary algorithm020206 networking & telecommunicationsGenetic programming02 engineering and technologyEvolutionary computation0203 mechanical engineeringEstimation of distribution algorithmGrammatical evolutionGenetic algorithm0202 electrical engineering electronic engineering information engineeringArtificial intelligenceCMA-ESbusiness
researchProduct