-
41
Motion Control of a Mobile Robot Using the Hedge–Algebras-Based Controller
Published 2023-01-01“…Simulations include one and two obstacle environments. Design variables, when optimizing, include the fuzzy parameters of linguistic variables and the reference range of state variables. …”
Get full text
Article -
42
Detailed Nonlinear Modeling and High-Fidelity Parallel Simulation of MMC With Embedded Energy Storage for Wind Farm Grid Integration
Published 2024-01-01“…In the meantime, components of an identical attribute are designed as one kernel despite inhomogeneity. The proposed modeling and computing method is applied to a multi-terminal DC system with wind farms, and significant speedups over CPU-based simulation are achieved, with the accuracy validated by the offline simulation tool PSCAD.…”
Get full text
Article -
43
High-Performance Multi-Object Tracking for Autonomous Driving in Urban Scenarios With Heterogeneous Embedded Boards
Published 2025-01-01“…We propose and discuss some non-trivial software design choices and implementation strategies that are needed to match the specific computational and memory access needs of MOT strategies, and the architectural opportunities of NVIDIA embedded GPGPU systems. …”
Get full text
Article -
44
Survey on RDMA protocol applications and security protection technologies
Published 2024-04-01“…The remote direct memory access (RDMA) technology, which has been effectively utilized to enhance data transfer rates and reduce CPU utilization, has played a significant role in various domains such as cross-regional data center transfers, high-performance computing, and rapid data read/write operations. …”
Get full text
Article -
45
A Fast Parallel Processing Algorithm for Triangle Collision Detection Based on AABB and Octree Space Slicing in Unity3D
Published 2025-01-01“…This approach is also designed to implement computation with GPU which utilizes the high-level shader language (HLSL) programming language on the compute shader Unity3D. …”
Get full text
Article -
46
Data Overlay Mesh in Distributed Clouds Allowing Collaborative Applications
Published 2025-01-01“…In modern architecture, multi-tenancy is the design mode of operation used to reduce the resource costs of system implementation. …”
Get full text
Article -
47
Research on resource monitoring and billing mechanisms of application engine in cloud computing environment
Published 2012-09-01“…A comprehensive study on the billing methods of existing cloud computing platforms was made.Then,AppScale,an open sourced scalable and typical PaaS software,as the foundation platform of our target resource monitoring and billing mechanisms was chose.Appscale’s structure,its components and how they worked together was analyzed.CloudMB,which enhanced AppScale by supporting process level resource monitoring and multi-user oriented billing function with flexible billing policies was designed and implemented.Finally,experiment verified that CloudMB is effective and its occupation of CPU time is lower than 3%.…”
Get full text
Article -
48
Simple and Efficient Preconditioner for Surface Integral Solution of Scattering from Multilayer Dielectric Bodies
Published 2016-01-01“…A simple and efficient preconditioner is designed for the surface integral solution of multilayer dielectric bodies and validated by numerical experiments. …”
Get full text
Article -
49
Dynamic Server Cluster Load Balancing in Virtualization Environment with OpenFlow
Published 2015-07-01“…Thus, we propose a load balancing algorithm based on server running state, which can calculate comprehensive loading according to the CPU utilization, memory utilization, and network traffic of the servers. …”
Get full text
Article -
50
Electrochemical Intelligent Recognition of Mineral Materials Based on Superpixel Image Segmentation
Published 2022-01-01“…And using the experiment, the CPU used in the experiment is Intel® Core™ i7-8700 3.2 GHz, the memory is 16 GB, and the GPU is NVIDIA GeForce GT × 1080 Ti, which ensures the accuracy of the experiment. …”
Get full text
Article -
51
Research on Linux network packet buffer recycling toward multi-core processor
Published 2009-01-01“…A lock-free algorithm for Linux packet buffer recycling on multi-core processor was proposed.Through making a model of Linux network packet forwarding, the principle of Linux packet buffer recycling was analyzed, and the main reason that the mechanism wasn’t extensible on multi-core processor was pointed out .It was that mutual exclusion and cache coherence operations consumed too much CPU clock tick.A new buffer recycling algorithm named MSRQ was designed and implemented.With the new algorithm, the parallel operations on the recycling queue were permitted without mutual exclusion on multi-core processor.And the new algorithm had better cache behavior than original recy-cling algorithm.The experiment result shows that the performance of Linux network packet forwarding with the new algorithm can be improved more than 67%.…”
Get full text
Article -
52
Breaking the Blockchain Trilemma: A Comprehensive Consensus Mechanism for Ensuring Security, Scalability, and Decentralization
Published 2024-01-01“…This paper introduces a pioneering blockchain architecture designed to transcend this trilemma, uniting advanced cryptographic methods, inventive security protocols, and dynamic decentralization mechanisms. …”
Get full text
Article -
53
An edge cloud–based body data sensing architecture for artificial intelligence computation
Published 2019-04-01“…Our cloud storage architecture is designed to support both stateful and stateless applications, which are compatible with traditional infrastructures and provide server consolidation with a CPU-aware scheduling of virtual machines. …”
Get full text
Article -
54
A Hybrid Simulated Annealing Heuristic for Multistage Heterogeneous Fleet Scheduling with Fleet Sizing Decisions
Published 2019-01-01“…Finally, some experiments are designed to test the proposed heuristic and the results show that the heuristic can generate reasonably good solutions in short CPU times.…”
Get full text
Article -
55
Research on flood defense mechanism of SDN control layer:detection and mitigation
Published 2021-11-01“…Aiming at the problem of spoofing flood defense in the control layer of SDN, a controller defense mechanism (CDM)was proposed, including a flood detection mechanism based on key features multi-classification and a flood mitigation mechanism based on SAVI.The flood feature analysis module of the control layer was designed for flood detection, and boosting algorithm was used to overlay each feature weak classifier to form an enhanced classifier, which can achieve more accurate classification spoofing flooding attack effect by continuously reducing the residual in the calculation.In CDM, a flood mitigation mechanism based on SAVI was deployed to realize flood mitigation, which performed flood packet path filtering based on binding-verification mode, and updated the flood features of access layer switches with dynamic polling mode to reduce redundant model update load.The experimental results show that the proposed method has the characteristics of low overhead and high precision.CDM effectively increases the security of the control layer, and reduces the time of host classification of spoofing flood attack and the CPU consumption of corresponding controller.…”
Get full text
Article -
56
An English Online Homework Tutoring System Supported by Internet Database
Published 2021-01-01“…Experimental results show that the designed platform has good data mining performance, low connection speed and low response delay, good compatibility, low CPU usage, fast resource sharing speed, and high user satisfaction. …”
Get full text
Article -
57
Optimization of reconfigurable SM2 algorithm over prime filed
Published 2022-03-01“…Aiming at the problems of inefficient of software, low utilization of hardware resources and poor scalability of SM2 algorithm, a reconfigurable optimization method of SM2 algorithm over prime filed was proposed.Through in-depth analysis of the SM2 algorithm, starting from different computation stages and characteristics, respectively using KOA fast multiplication, fast modular reduction and Barrett algorithm to achieve recommended or arbitrary parameters of the modular multiplication operation, and the radix-4 extended Euclidean algorithm was optimized and improved to accelerate the modular inverse operation.Then, in the standard projective coordinate system, the Montgomery method was used to improve the efficiency of point multiplication, and the data flow of point addition and double point was optimized to shorten the operation cycle to 12 clocks.At the same time, fast coordinate system conversion was realized inside the FPGA.Finally, the parallel scheduling management of multi-SM2 was designed and implemented to meet the computational requirements of multiple applications.The experimental results show that the optimized SM2 makes full use of FPGA resources and shortens the cycle of point multiplication.The maximum number of calculations per second is 352.48 times higher than the CPU (Intel i5-8300), which improves the performance and scalability.…”
Get full text
Article -
58
Quality of experience provisioned mobile streaming protocol for the hyper-connected Internet of Things devices over the heterogeneous wireless access networks
Published 2016-09-01“…The proposed protocol is designed independently of OS versions and CPU performance of terminals, which makes it easy to be implanted in various types of Internet of Things devices. …”
Get full text
Article -
59
A Unified Shape-From-Shading Approach for 3D Surface Reconstruction Using Fast Eikonal Solvers
Published 2020-01-01“…The first component is designed to address different reflectance properties including diffuse, specular, and hybrid reflections in the imaging process of the camera. …”
Get full text
Article -
60
Special Vehicle Classification Algorithm-Based System for Dedicated Parking Zone Violation Detection in South Korea
Published 2025-01-01“…These two algorithms are designed for real-time object detection and efficient preprocessing, respectively, and can operate in real time in resource-constrained edge-device environments. …”
Get full text
Article