memory size
Recently Published Documents


TOTAL DOCUMENTS

142
(FIVE YEARS 23)

H-INDEX

12
(FIVE YEARS 2)

Author(s):  
Aref Gholizadeh Manghutay ◽  
Mehdi Salay Naderi ◽  
Seyed Hamid Fathi

Purpose Heuristic algorithms have been widely used in different types of optimization problems. Their unique features in terms of running time and flexibility have made them superior to deterministic algorithms. To accurately compare different heuristic algorithms in solving optimization problems, the final optimal solution needs to be known. Existing deterministic methods such as Exhaustive Search and Integer Linear Programming can provide the final global optimal solution for small-scale optimization problems. However, as the system grows the number of calculations and required memory size incredibly increases, so applying existing deterministic methods is no longer possible for medium and large-scale systems. The purpose of this paper is to introduce a novel deterministic method with short running time and small memory size requirement for optimal placement of Micro Phasor Measurement Units (µPMUs) in radial electricity distribution systems to make the system completely observable. Design/methodology/approach First, the principle of the method is explained and the observability of the system is analyzed. Then, the algorithm’s running time and memory usage when applying on some of the modified versions of the Institute of Electrical and Electronics Engineers 123-node test feeder are obtained and compared with those of its deterministic counterparts. Findings Because of the innovative method of step-by-step placement of µPMUs, a unique method is developed. Simulation results elucidate that the proposed method has unique features of short running time and small memory size requirements. Originality/value While the mathematical background of the observability study of electricity distribution systems is very well-presented in the referenced papers, the proposed step-by-step placement method of µPMUs, which shrinks unobservable parts of the system in each step, is not discussed yet. The presented paper is directly applicable to typical problems in the field of power systems.


2021 ◽  
Author(s):  
V.N. Vasyukov ◽  
D.N. Zima ◽  
I.F. Lozovskiy ◽  
Yu.V. Morozov ◽  
A.A. Murasev ◽  
...  

The paper states the principles of simulation of wideband signals applied in a surveillance radar. The resource of the radar model is analyzed with respect to sample rate of processed signals and required memory size as generated signals, noises, active and passive interferences demand a lot of memory. It is proposed to simulate only active intervals of operation of a pulse radar at zero frequency in the frequency domain.


2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Yake Li ◽  
Siu O’Young

The range migration algorithm (RMA) is an accurate imaging method for processing synthetic aperture radar (SAR) signals. However, this algorithm requires a big amount of computation when performing Stolt mapping. In high squint and wide beamwidth imaging, this operation also requires big memory size to store the result spectrum after Stolt mapping because the spectrum will be significantly expanded. A modified Stolt mapping that does not expand the signal spectrum while still maintains the processing accuracy is proposed in this paper to improve the efficiency of the RMA when processing frequency modulated continuous wave (FMCW) SAR signals. The modified RMA has roughly the same computational load and required the same memory size as the range Doppler algorithm (RDA) when processing FMCW SAR data. In extreme cases when the original spectrum is significantly modified by the Stolt mapping, the modified RMA achieves better focusing quality than the traditional RMA. Simulation and real data is used to verify the performance of the proposed RMA.


Author(s):  
Michael Majurski ◽  
Peter Bajcsy

We address the problem of performing exact (tiling-error free) out-of-core semantic segmentation inference of arbitrarily large images using fully convolutional neural networks (FCN). FCN models have the property that once a model is trained, it can be applied on arbitrarily sized images, although it is still constrained by the available GPU memory. This work is motivated by overcoming the GPU memory size constraint without numerically impacting the fnal result. Our approach is to select a tile size that will ft into GPU memory with a halo border of half the network receptive feld. Next, stride across the image by that tile size without the halo. The input tile halos will overlap, while the output tiles join exactly at the seams. Such an approach enables inference to be performed on whole slide microscopy images, such as those generated by a slide scanner. The novelty of this work is in documenting the formulas for determining tile size and stride and then validating them on U-Net and FC-DenseNet architectures. In addition, we quantify the errors due to tiling confgurations which do not satisfy the constraints, and we explore the use of architecture effective receptive felds to estimate the tiling parameters.


Sensors ◽  
2021 ◽  
Vol 21 (9) ◽  
pp. 3022
Author(s):  
Rodrigo Vazquez-Lopez ◽  
Juan Carlos Herrera-Lozada ◽  
Jacobo Sandoval-Gutierrez ◽  
Philipp von Bülow ◽  
Daniel Librado Martinez-Vazquez

There are several tools, frameworks, and algorithms to solve information sharing from multiple tasks and robots. Some applications such as ROS, Kafka, and MAVLink cover most problems when using operating systems. However, they cannot be used for particular problems that demand optimization of resources. Therefore, the objective was to design a solution to fit the resources of small vehicles. The methodology consisted of defining the group of vehicles with low performance or are not compatible with high-level known applications; design a reduced, modular, and compatible architecture; design a producer-consumer algorithm that adjusts to the simultaneous localization and communication of multiple vehicles with UWB sensors; validate the operation with an interception task. The results showed the feasibility of performing architecture for embedded systems compatible with other applications managing information through the proposed algorithm allowed to complete the interception task between two vehicles. Another result was to determine the system’s efficiency by scaling the memory size and comparing its performance. The work’s contributions show the areas of opportunity to develop architectures focusing on the optimization of robot resources and complement existing ones.


For real-time inspection of color, the LUT approach is the best of the techniques considered. In computer science, a lookup table is an array that replaces runtime computation with a simpler array indexing operation. The savings in terms of processing time can be significant, since retrieving a value from memory is often faster than undergoing an expensive computation or input & output operation. The tables may be precalculated and stored in static program storage, as part of a program's initialization phase, or even stored in hardware in application-specific platforms. Lookup tables are also used extensively to validate input values by matching against a list of valid items in an array and, in some programming languages, may include pointer functions to process the matching input. The disadvantage of the LUT approach is the large memory size. The memory size has been reduced significantly by applying a multitude of ROM compression methods.


2021 ◽  
pp. 376-406
Author(s):  
Yusuke Naito ◽  
Yu Sasaki ◽  
Takeshi Sugawara

Entropy ◽  
2020 ◽  
Vol 22 (7) ◽  
pp. 766
Author(s):  
Nujoom Sageer Karat ◽  
Anoop Thomas ◽  
Balaji Sundar Rajan

For coded caching problems with small buffer sizes and the number of users no less than the amount of files in the server, an optimal delivery scheme was proposed by Chen, Fan, and Letaief in 2016. This scheme is referred to as the CFL scheme. In this paper, an extension to the coded caching problem where the link between the server and the users is error prone, is considered. The closed form expressions for average rate and peak rate of error correcting delivery scheme are found for the CFL prefetching scheme using techniques from index coding. Using results from error correcting index coding, an optimal linear error correcting delivery scheme for caching problems employing the CFL prefetching is proposed. Another scheme that has lower sub-packetization requirement as compared to CFL scheme for the same cache memory size was considered by J. Gomez-Vilardebo in 2018. An optimal linear error correcting delivery scheme is also proposed for this scheme.


In day to day life, the computer plays a major role, due to this advancement of technology collection of data from various fields are increasing. A large amount of data is produced by various fields for every second and is not easy to process. This large amount of data is called as Big data. A large number of small files also considered as Big data. It's not easy to process and store the small files in Hadoop. In the existing methods Merging technologies and Clustering Techniques are used to combine smaller files to large files up to 128 MB before sending it to HDFS in Hadoop. In the Proposed system CSFC (Clustering Small Files based on Centroid) Clustering Technique is used without mentioning the number of Clusters previously because if the clusters are mentioned before, all the files are clubbed within the limited number of clusters. In proposing system clusters are generated by depending on the number of related files in the dataset. The relevant files are combined up to 128 MB in a cluster. If any file is not relevant to the existing cluster or if the memory size reached 128MB then-new cluster will be generated and the file will be stored. It is easy to process the related files, comparing two irrelevant files. By using this method fetching data from the data node, it produces efficient result when comparing with other clustering techniques.


Sign in / Sign up

Export Citation Format

Share Document