首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
3.
Two-dimensional fast Fourier transform (FFT) for image processing and filtering is widely used in modern digital image processing systems. This paper concerns the possibility of using a modification of two-dimensional FFT with an analog of the Cooley–Tukey algorithm, which requires a smaller number of complex addition and multiplication operations than the standard method of calculation by rows and columns.  相似文献   

4.
5.

Cloud computing delivers resources such as software, data, storage and servers over the Internet; its adaptable infrastructure facilitates on-demand access of computational resources. There are many benefits of cloud computing such as being scalable, paying only for consumption, improving accessibility, limiting investment costs and being environmentally friendly. Thus, many organizations have already started applying this technology to improve organizational efficiency. In this study, we developed a cloud-based book recommendation service that uses a principle component analysis–scale-invariant feature transform (PCA-SIFT) feature detector algorithm to recommend book(s) based on a user-uploaded image of a book or collection of books. The high dimensionality of the image is reduced with the help of a principle component analysis (PCA) pre-processing technique. When the mobile application user takes a picture of a book or a collection of books, the system recognizes the image(s) and recommends similar books. The computational task is performed via the cloud infrastructure. Experimental results show the PCA-SIFT-based cloud recommendation service is promising; additionally, the application responds faster when the pre-processing technique is integrated. The proposed generic cloud-based recommendation system is flexible and highly adaptable to new environments.

  相似文献   

6.
Engineering with Computers - In this study, we propose a new hybrid algorithm fusing the exploitation ability of the particle swarm optimization (PSO) with the exploration ability of the grey wolf...  相似文献   

7.
8.
Matrix-Matrix Multiplication (MMM) is a highly important kernel in linear algebra algorithms and the performance of its implementations depends on the memory utilization and data locality. There are MMM algorithms, such as standard, Strassen–Winograd variant, and many recursive array layouts, such as Z-Morton or U-Morton. However, their data locality is lower than that of the proposed methodology. Moreover, several SOA (state of the art) self-tuning libraries exist, such as ATLAS for MMM algorithm, which tests many MMM implementations. During the installation of ATLAS, on the one hand an extremely complex empirical tuning step is required, and on the other hand a large number of compiler options are used, both of which are not included in the scope of this paper. In this paper, a new methodology using the standard MMM algorithm is presented, achieving improved performance by focusing on data locality (both temporal and spatial). This methodology finds the scheduling which conforms with the optimum memory management. Compared with (Chatterjee et al. in IEEE Trans. Parallel Distrib. Syst. 13:1105, 2002; Li and Garzaran in Proc. of Lang. Compil. Parallel Comput., 2005; Bilmes et al. in Proc. of the 11th ACM Int. Conf. Super-comput., 1997; Aberdeen and Baxter in Concurr. Comput. Pract. Exp. 13:103, 2001), the proposed methodology has two major advantages. Firstly, the scheduling used for the tile level is different from the element level’s one, having better data locality, suited to the sizes of memory hierarchy. Secondly, its exploration time is short, because it searches only for the number of the level of tiling used, and between (1, 2) (Sect. 4) for finding the best tile size for each cache level. A software tool (C-code) implementing the above methodology was developed, having the hardware model and the matrix sizes as input. This methodology has better performance against others at a wide range of architectures. Compared with the best existing related work, which we implemented, better performance up to 55% than the Standard MMM algorithm and up to 35% than Strassen’s is observed, both under recursive data array layouts.  相似文献   

9.
International Journal of Information Security - Network hardening is an optimization problem to find the best combination of countermeasures to protect a network from cyber-attacks. While an...  相似文献   

10.
The present paper is a theoretical contribution to the field of iterative methods for solving inconsistent linear least squares problems arising in image reconstruction from projections in computerized tomography. It consists on a hybrid algorithm which includes in each iteration a CG-like step for modifying the right-hand side and a Kaczmarz-like step for producing the approximate solution. We prove convergence of the hybrid algorithm for general inconsistent and rank-deficient least-squares problems. Although the new algorithm has potential for more applied experiments and comparisons, we restrict them in this paper to a regularized image reconstruction problem involving a 2D medical data set.  相似文献   

11.
We consider the Rosenfeld–Gröbner algorithm for computing a regular decomposition of a radical differential ideal generated by a set of ordinary differential polynomials in nn indeterminates. For a set of ordinary differential polynomials FF, let M(F)M(F) be the sum of maximal orders of differential indeterminates occurring in FF. We propose a modification of the Rosenfeld–Gröbner algorithm, in which for every intermediate polynomial system FF, the bound M(F)?(n−1)!M(F0)M(F)?(n1)!M(F0) holds, where F0F0 is the initial set of generators of the radical ideal. In particular, the resulting regular systems satisfy the bound. Since regular ideals can be decomposed into characterizable components algebraically, the bound also holds for the orders of derivatives occurring in a characteristic decomposition of a radical differential ideal.  相似文献   

12.
This paper considers the problem of suppressing complex-jamming, which contains sidelobe blanket jammings (SLJs), multiple near-mainlobe blanket jammings (multiple-NMLJs) and self-defensive false target jamming (SDJ). We propose a blind source separation (BSS)-based space–time multi-channel algorithm for complex-jamming suppression. The space–time multi-channel consists of spatial multiple beams and temporal multiple adjacent pulse repetition intervals (PRIs). The source signals can be separated by the BSS, owing to their statistical independence. The real target and SDJ can then be obtained by the pulse compression approach, distinguished by echo identification simultaneously. A remarkable feature of the proposed approach is that it does not require prior knowledge about real target or jammings, and it is easy to implement for engineering applications.  相似文献   

13.
This article proposes a hybrid optimization algorithm based on a modified BFGS and particle swarm optimization to solve medium scale nonlinear programs. The hybrid algorithm integrates the modified BFGS into particle swarm optimization to solve augmented Lagrangian penalty function. In doing so, the algorithm launches into a global search over the solution space while keeping a detailed exploration into the neighborhoods. To shed light on the merit of the algorithm, we provide a test bed consisting of 30 test problems to compare our algorithm against two of its variations along with two state-of-the-art nonlinear optimization algorithms. The numerical experiments illustrate that the proposed algorithm makes an effective use of hybrid framework when dealing with nonlinear equality constraints although its convergence cannot be guaranteed.  相似文献   

14.
A precedence order is defined based on the release dates of jobs' direct successors. Using the defined precedence order and Heap Sort, a new polynomial algorithm is provided which aims to solve the parallel scheduling problem P|p = 1, r ,outtree|∑C . The new algorithm is shown to be more compact and easier to implement.  相似文献   

15.
In this article we present a computationally efficient subdivision algorithm for the evaluation of generalized Bernstein–Bézier curves. As particular cases we have subdivision algorithms for classical as well as trigonometric Bernstein–Bézier curves.  相似文献   

16.
S. Masih Ayat 《Cryptologia》2013,37(6):497-503
Abstract

This paper presents a recursive algorithm for solving “a secret sharing” problem. This problem is one of the unsolved problems in the Second International Students Olympiad in Cryptography (NSUCRYPTO2015). Recently, Geut et al. solved the problem in a special case. We show that our algorithm is able to solve it in general.  相似文献   

17.
18.
In this paper we present a hybrid strategy developed using genetic algorithms (GAs), simulated annealing (SA), and quantum simulated annealing techniques (QSA) for the discrete time–cost trade-off problem (DTCTP). In the hybrid algorithm (HA), SA is used to improve hill-climbing ability of GA. In addition to SA, the hybrid strategy includes QSA to achieve enhanced local search capability. The HA and a sole GA have been coded in Visual C++ on a personal computer. Ten benchmark test problems with a range of 18 to 630 activities are used to evaluate performance of the HA. The benchmark problems are solved to optimality using mixed integer programming technique. The results of the performance analysis indicate that the hybrid strategy improves convergence of GA significantly and HA provides a powerful alternative for the DTCTP.  相似文献   

19.
In this paper, we propose a fast algorithm for efficient and accurate solution of the space–time fractional diffusion equations defined in a rectangular domain. The spatial discretization is done by using the central finite difference scheme and matrix transfer technique. Due to its nonlocality, numerical discretization of the spectral fractional Laplacian (?Δ)sα/2 results in a large dense matrix. This causes considerable challenges not only for storing the matrix but also for computing matrix–vector products in practice. By utilizing the compact structure of the discrete system and the discrete sine transform, our algorithm avoids to store the large matrix from discretizing the nonlocal operator and also significantly reduces the computational costs. We then use the Laplace transform method for time integration of the semi-discretized system and a weighted trapezoidal method to numerically compute the convolutions needed in the resulting scheme. Various experiments are presented to demonstrate the efficiency and accuracy of our method.  相似文献   

20.
Neural Computing and Applications - To obtain the optimal set of features in feature selection problems is the most challenging and prominent problem in machine learning. Very few human-related...  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号