previous algorithm
Recently Published Documents


TOTAL DOCUMENTS

87
(FIVE YEARS 35)

H-INDEX

11
(FIVE YEARS 2)

Sensors ◽  
2021 ◽  
Vol 22 (1) ◽  
pp. 315
Author(s):  
Yeongwon Lee ◽  
Byungyong You

In this paper, we propose a new free space detection algorithm for autonomous vehicle driving. Previous free space detection algorithms often use only the location information of every frame, without information on the speed of the obstacle. In this case, there is a possibility of creating an inefficient path because the behavior of the obstacle cannot be predicted. In order to compensate for the shortcomings of the previous algorithm, the proposed algorithm uses the speed information of the obstacle. Through object tracking, the dynamic behavior of obstacles around the vehicle is identified and predicted, and free space is detected based on this. In the free space, it is possible to classify an area in which driving is possible and an area in which it is not possible, and a route is created according to the classification result. By comparing and evaluating the path generated by the previous algorithm and the path generated by the proposed algorithm, it is confirmed that the proposed algorithm is more efficient in generating the vehicle driving path.


2021 ◽  
Vol 18 (4) ◽  
pp. 1-27
Author(s):  
Matthew Tomei ◽  
Shomit Das ◽  
Mohammad Seyedzadeh ◽  
Philip Bedoukian ◽  
Bradford Beckmann ◽  
...  

Cache-block compression is a highly effective technique for both reducing accesses to lower levels in the memory hierarchy (cache compression) and minimizing data transfers (link compression). While many effective cache-block compression algorithms have been proposed, the design of these algorithms is largely ad hoc and manual and relies on human recognition of patterns. In this article, we take an entirely different approach. We introduce a class of “byte-select” compression algorithms, as well as an automated methodology for generating compression algorithms in this class. We argue that, based on upper bounds within the class, the study of this class of byte-select algorithms has potential to yield algorithms with better performance than existing cache-block compression algorithms. The upper bound we establish on the compression ratio is 2X that of any existing algorithm. We then offer a generalized representation of a subset of byte-select compression algorithms and search through the resulting space guided by a set of training data traces. Using this automated process, we find efficient and effective algorithms for various hardware applications. We find that the resulting algorithms exploit novel patterns that can inform future algorithm designs. The generated byte-select algorithms are evaluated against a separate set of traces and evaluations show that Byte-Select has a 23% higher compression ratio on average. While no previous algorithm performs best for all our data sets which include CPU and GPU applications, our generated algorithms do. Using an automated hardware generator for these algorithms, we show that their decompression and compression latency is one and two cycles respectively, much lower than any existing algorithm with a competitive compression ratio.


Author(s):  
Smitha Krishnan ◽  
Dr B.G Prasanthi

Today, the most recent paradigm to emerge is that of Cloud computing, which promises reliable services delivered to the end-user through next-generation data centres which are built on virtualized compute and storage technologies Consumer will be able to access desired service from a “Cloud” anytime anywhere in the world on the bases of demand. Computing services need to be highly reliable, scalable, easy accessible and autonomic to support ever-present access, dynamic discovery and computability, consumers indicate the required service level through Quality of Service (QoS) parameters, according to Service Level Agreements (SLAs) A suitable mdel for the prediction is being developed. Here Genetic Algorithm is chosen in combination with stastical model to do the workload prediction .It is expected to give better result by producing less error rate and more accuracy of prediction compared to the previous algorithm.


Author(s):  
Attila Hideg ◽  
Tamás Lukovszki ◽  
Bertalan Forstner

In this paper, a particular type of dispersion is further investigated, which is called Filling. In this problem, robots are injected one by one into an a priori not known area and have to travel across until the whole area is covered. The coverage is achieved by a robotic team whose hardware capabilities are restricted in order to maintain low production costs. This includes limited viewing and communication ranges. In this work, we present an algorithm solving the synchronous Filling problem in O((k + ∆)·n) time steps by n robots with a viewing range of 1 hop, where k is the number of doors, n is the number of vertices of the graph, and ∆ is the maximum degree of the graph. This improves the best previously known running time bound of O(k · ∆ · n). Furthermore, we remove the constraint from the previous algorithm that the door vertices need to have a degree of 1.


2021 ◽  
Vol 13 (2) ◽  
pp. 82-93
Author(s):  
Yoga Prasetia ◽  
Ghulam Asrofi Buntoro ◽  
Dwiyono Ariyadi

Blind is a term used to define the human condition given a privilege by God in the sense of sight, this condition makes blind people have a little difficulty in carrying out daily activities. Money is a primary human need and is very important for daily buying and selling transactions. Indonesian money, especially paper money, has an embossed line that can help people with visual impairments a little, but there is some money circulating in the market that is damaged or missing lines of appearance which makes it difficult for blind people to recognize the nominal of the money. The research was conducted at the “AISYIYAH” Orphanage for the Blind in Ponorogo by conducting several interviews with blind people, the informants provided information that they could recognize money on a daily basis but only applies to banknotes with good condition and the latest output, for damaged banknotes. or the old output is hard to identify. To help the blind recognize money, an android-based application was designed with the Knuth-Morris-Pratt algorithm which is a type of string matching algorithm. This algorithm is a development algorithm from the previous algorithm, namely the Brute Force algorithm. The final result of this study shows that the android application designed using the Knuth-Morris-Pratt algorithm is able to recognize nominal money with an accuracy rate of 100%.


2021 ◽  
Vol 5 (3) ◽  
pp. 1166
Author(s):  
Muchamad Sobri Sungkar ◽  
M Taufik Qurohman

Computer system architecture is one of the subjects that must be taken in the informatics engineering study program. In the study program the graduation of each student in the course is one of the important aspects that must be evaluated every semester. Graduation for each student / I in the course is an illustration that the learning process delivered is going well and also the material presented by the lecturer in charge of the course can be digested by students. Graduation of each student in the course can be predicted based on the habit pattern of the students. Data mining is an alternative process that can be done to find out habit patterns based on the data that has been collected. Data mining itself is an extraction process on a collection of data that produces valuable information for companies, agencies or organizations that can be used in the decision-making process. Prediction of graduation with data mining can be solved by classifying the data set. The C5.0 algorithm is an improvement algorithm from the C4.5 algorithm where the process is almost the same, only the C5.0 algorithm has advantages over the previous algorithm. The results of the C5.0 algorithm are in the form of a decision tree or a rule that is formed based on the entropy or gain value. The prediction process is carried out based on the classification of the C5.0 algorithm by using the attributes of Attendance Value, Assignment Value, UTS Value and UAS Value. The final result of the C5.0 algorithm classification process is a decision tree with rules in it. The performance of the C5.0 algorithm gets a high accuracy rate of 93.33%


2021 ◽  
Vol 6 (2) ◽  
pp. 192
Author(s):  
Qurotul Aini ◽  
Ninda Lutfiani ◽  
Hendra Kusumah ◽  
Muhammad Suzaki Zahran

Object recognition and detection have been in request by numerous parties since Computer Vision innovation within the 1960s, both within the industrial and medical area. Since then, many studies have focused on object recognition and detection with various types of algorithm models that can recognize and detect objects in an image. However, not all of these algorithm models are efficient and effective in their application. Most of the previous algorithm models have a relatively high level of complexity. Here, the author tries to explain and introduce the YOLO (You only look once) algorithm model, which has a high enough image detection processing speed capability and accuracy that can compete with the previous algorithm models. There are several advantages and disadvantages of each version made, which are explained in the discussion section.


2021 ◽  
pp. 147387162110281
Author(s):  
Alihan Okka ◽  
Ugur Dogrusoz ◽  
Hasan Balci

This paper describes a new automatic layout algorithm named CoSEP for compound graphs with port constraints. The algorithm works by extending the physical model of a previous algorithm named CoSE by defining additional force types and heuristics for constraining edges to connect to certain user-defined locations on end nodes. Similar to its predecessor, CoSEP also accounts for non-uniform node dimensions and arbitrary levels of nesting via compound nodes. Our experiments show that CoSEP significantly improves the quality of the layouts for compound graphs with port constraints with respect to commonly accepted graph drawing criteria while running reasonably fast, suitable for use in interactive applications for small to medium-sized (up to 500 nodes) graphs. A complete JavaScript implementation of CoSEP as a Cytoscape.js extension along with a demo page is freely available at https://github.com/iVis-at-Bilkent/cytoscape.js-cosep .


2021 ◽  
Vol 13 (13) ◽  
pp. 2642
Author(s):  
Flor G. Ortiz-Gomez ◽  
Miguel A. Salas-Natera ◽  
Ramón Martínez ◽  
Salvador Landeros-Ayala

Very High Throughput Satellites (VHTS) have a pivotal role in complementing terrestrial networks to increase traffic demand. VHTS systems currently assume a uniform distribution of traffic in the service area, but in a real system, traffic demands are not uniform and are dynamic. A possible solution is to use flexible payloads, but the cost of the design increases considerably. On the other hand, a fixed payload that uses irregular beam coverage depending on traffic demand allows maintaining the cost of a fixed payload while minimizing the error between offered and required capacity. This paper presents a proposal for optimizing irregular beams coverage and beam pattern, minimizing the costs per Gbps in orbit, the Normalized Coverage Error, and Offered Capacity Error per beam. We present the analysis and performance for the case study and compare it with a previous algorithm for a uniform coverage area.


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Chunyang Qi ◽  
Jie Huang ◽  
Bin Wang ◽  
Hongkai Wang

To solve the problem of security deployment in a hybrid wireless sensor network, a novel privacy-preserving mobile coverage scheme based on trustworthiness is proposed. The novel scheme can efficiently mitigate some malicious attacks such as eavesdropping and pollution and optimize the coverage of hybrid wireless sensor networks (HWSNs) at the same time. Compared with the traditional mobile coverage scheme, the security of data transmission and mobility are considered in the deployment of HWSNs. Firstly, our scheme can mitigate the eavesdropping attacks efficiently utilizing privacy-preserving signature. Then, the trust mobile protocol based on the trustworthiness is used to defend the pollution attacks and improve the security of mobility. In privacy-preserving signature, the hardness of discrete logarithm determines the degree of security of the privacy-preserving signature. The correctness and effectiveness of signature algorithm are proven by the probabilities of the native messages which can be recovered and forged which is negligible. Furthermore, a mobile scheme based on the trustworthiness (MSTW) is proposed to optimize the network coverage and improve the security of mobility. Finally, the simulation compared with a previous algorithm is carried out, in which the communication overhead, computational complexity, and the coverage are given. The result of the simulation shows that our scheme has roughly the same network coverage as the previous schemes on the basis of ensuring the security of the data transmission and mobility.


Sign in / Sign up

Export Citation Format

Share Document