首页 > 最新文献

2008 International Conference on Computer and Electrical Engineering最新文献

英文 中文
Chain Rule Protection over the Internet Using PUGGAD Algorithm 基于PUGGAD算法的互联网链式规则保护
Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.153
V. Suttichaya, P. Bhattarakosol
Since data is a vital resource that must be transferred over the Internet, the security issue of this resource must be considered seriously. There are various methods have been proposed by researchers; some of them have been implemented, such as DES and AES. However, those methods have some limitations that allow the plaintext to be unsaved from any threats while it was transferring over the Internet. Nevertheless, one perfect cipher method called one-time pad (OTP) had been proposed. Unfortunately, it has never been implemented in the real application according to the length of the key and the randomness problem. Thus, this paper proposed a method called the PUGGAD, or the Pad/functional key algorithm for General encrypt/Decrypt, to encrypt all types of plaintexts before sending across the Internet to its destination, both in binary mode and text mode. This method is implemented based on the OTP concept except that all complications of OTP have been pulled over. Additionally, the PUGGAD algorithm is the chain rule protection process where a plaintext must be split into an individual block size before the encryption process starts. Thus, obtaining only some blocks of the ciphertext over the Internet under the PUGGAD protection mechanism, hackers cannot decrypt back to the original plaintext as same as other protection methods.
由于数据是必须通过Internet传输的重要资源,因此必须认真考虑该资源的安全问题。研究人员提出了各种方法;其中一些已经实现,如DES和AES。然而,这些方法有一些限制,允许明文在互联网上传输时不受任何威胁。尽管如此,人们还是提出了一种完美的密码方法——一次性密码垫(OTP)。遗憾的是,由于密钥的长度和随机性问题,在实际应用中从未实现过。因此,本文提出了一种称为PUGGAD的方法,即通用加密/解密的Pad/功能密钥算法,用于在通过Internet发送到目的地之前对所有类型的明文进行加密,包括二进制模式和文本模式。该方法是在OTP概念的基础上实现的,只是去掉了OTP的所有复杂性。此外,PUGGAD算法是链式规则保护过程,在加密过程开始之前,明文必须分割成单个块大小。因此,在PUGGAD保护机制下,黑客只能通过互联网获取部分密文,无法像其他保护方法一样解密回原始的明文。
{"title":"Chain Rule Protection over the Internet Using PUGGAD Algorithm","authors":"V. Suttichaya, P. Bhattarakosol","doi":"10.1109/ICCEE.2008.153","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.153","url":null,"abstract":"Since data is a vital resource that must be transferred over the Internet, the security issue of this resource must be considered seriously. There are various methods have been proposed by researchers; some of them have been implemented, such as DES and AES. However, those methods have some limitations that allow the plaintext to be unsaved from any threats while it was transferring over the Internet. Nevertheless, one perfect cipher method called one-time pad (OTP) had been proposed. Unfortunately, it has never been implemented in the real application according to the length of the key and the randomness problem. Thus, this paper proposed a method called the PUGGAD, or the Pad/functional key algorithm for General encrypt/Decrypt, to encrypt all types of plaintexts before sending across the Internet to its destination, both in binary mode and text mode. This method is implemented based on the OTP concept except that all complications of OTP have been pulled over. Additionally, the PUGGAD algorithm is the chain rule protection process where a plaintext must be split into an individual block size before the encryption process starts. Thus, obtaining only some blocks of the ciphertext over the Internet under the PUGGAD protection mechanism, hackers cannot decrypt back to the original plaintext as same as other protection methods.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121668470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Using Degree-Based Strategy for Network Coding in Content Distribution Network 基于度的内容分发网络编码策略
Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.20
Tingyi Li, Jinlin Wang, Jiali You
In a content distribution network based on overlay networks, the peer's upload bandwidth is always constrained. To optimize the system performance, one problem is how to assign the upload capacity to the right neighbors for transferring data blocks. In a system using network coding technology, a strategy which is to select the right neighbors based upon the degrees of them is proposed. The selection probability of each neighbor is determined by its degree. After. this strategy is applied, the utilization of network is improved, and the distribution progress is shortened. From the simulation, we found that the performance of content distribution is obviously better than the baseline system on three metrics, including maximum finish time, average finish time and standard deviation.
在基于覆盖网络的内容分发网络中,对等体的上传带宽总是受限的。为了优化系统性能,一个问题是如何将上传容量分配给合适的邻居来传输数据块。在采用网络编码技术的系统中,提出了一种基于邻居度选择正确邻居的策略。每个邻居的选择概率由其程度决定。后。采用该策略,提高了网络利用率,缩短了配送进度。通过仿真,我们发现内容分发系统在最大完成时间、平均完成时间和标准差三个指标上的性能明显优于基线系统。
{"title":"Using Degree-Based Strategy for Network Coding in Content Distribution Network","authors":"Tingyi Li, Jinlin Wang, Jiali You","doi":"10.1109/ICCEE.2008.20","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.20","url":null,"abstract":"In a content distribution network based on overlay networks, the peer's upload bandwidth is always constrained. To optimize the system performance, one problem is how to assign the upload capacity to the right neighbors for transferring data blocks. In a system using network coding technology, a strategy which is to select the right neighbors based upon the degrees of them is proposed. The selection probability of each neighbor is determined by its degree. After. this strategy is applied, the utilization of network is improved, and the distribution progress is shortened. From the simulation, we found that the performance of content distribution is obviously better than the baseline system on three metrics, including maximum finish time, average finish time and standard deviation.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125620641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Induction Heating Power Supply Temperature Control Based on a Novel Fuzzy Controller 基于新型模糊控制器的感应加热电源温度控制
Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.64
Yiwang Wang, Fengwen Cao
This paper introduces a kind of novel fuzzy controller for induction heating temperature control. The working principle and the configuration of the control system are analyzed in detail. A complete simulation model of the induction heating system is obtained by MATLAB/SIMULINK software. The results of the simulation are presented and showed the effectiveness and superiority of this temperature control system.
介绍了一种用于感应加热温度控制的新型模糊控制器。详细分析了控制系统的工作原理和结构。利用MATLAB/SIMULINK软件建立了感应加热系统的完整仿真模型。仿真结果表明了该温度控制系统的有效性和优越性。
{"title":"Induction Heating Power Supply Temperature Control Based on a Novel Fuzzy Controller","authors":"Yiwang Wang, Fengwen Cao","doi":"10.1109/ICCEE.2008.64","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.64","url":null,"abstract":"This paper introduces a kind of novel fuzzy controller for induction heating temperature control. The working principle and the configuration of the control system are analyzed in detail. A complete simulation model of the induction heating system is obtained by MATLAB/SIMULINK software. The results of the simulation are presented and showed the effectiveness and superiority of this temperature control system.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115141041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A New Technique for Improving the Power Quality in Power Transformers by FPGA 利用FPGA提高电力变压器电能质量的新技术
Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.111
P. Kumar, K. Anjaneyulu, T. M. Krishna
Maintenance of good quality of power supply is essential for reliability and stability of power system. The effects due to power transformer switching and the transient effects are investigated in this paper. The DWT based techniques are suggested in the past to analyze the transient effects and to respond at a faster rate to improve the quality of power system and its protection. These measures were though efficient in providing better solution but found to be high resource consuming under remote applications. This high resource consumption results in slower response and reduces the reliability in power system. A FPGA based DWT architecture is suggested to improve the efficiency of estimation and response in the power system. The Field Programmable Gate Arrays (FPGA) based DWT architecture is evaluated with theoretical results from MATLAB and were observed to be meeting the accuracy of estimation.
保持良好的供电质量对电力系统的可靠性和稳定性至关重要。本文研究了电力变压器开关的影响和暂态效应。以往建议采用基于小波变换的技术来分析暂态效应,以更快的速度响应,以提高电力系统的质量和保护水平。这些措施虽然在提供更好的解决方案方面是有效的,但在远程应用程序中被发现是高资源消耗。这种高资源消耗导致响应速度变慢,降低了电力系统的可靠性。为了提高电力系统的估计和响应效率,提出了一种基于FPGA的小波变换结构。利用MATLAB的理论结果对基于现场可编程门阵列(FPGA)的DWT结构进行了评估,结果表明该结构满足估计的精度。
{"title":"A New Technique for Improving the Power Quality in Power Transformers by FPGA","authors":"P. Kumar, K. Anjaneyulu, T. M. Krishna","doi":"10.1109/ICCEE.2008.111","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.111","url":null,"abstract":"Maintenance of good quality of power supply is essential for reliability and stability of power system. The effects due to power transformer switching and the transient effects are investigated in this paper. The DWT based techniques are suggested in the past to analyze the transient effects and to respond at a faster rate to improve the quality of power system and its protection. These measures were though efficient in providing better solution but found to be high resource consuming under remote applications. This high resource consumption results in slower response and reduces the reliability in power system. A FPGA based DWT architecture is suggested to improve the efficiency of estimation and response in the power system. The Field Programmable Gate Arrays (FPGA) based DWT architecture is evaluated with theoretical results from MATLAB and were observed to be meeting the accuracy of estimation.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127729494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Precision and Compact Dynamic Bending Tester 精密紧凑动态弯曲试验机
Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.117
K. Maru, Y. Fujii
A method for precision force measurement by using the levitation mass method (LMM) is reviewed. In this method, a mass levitated using a pneumatic linear bearing with sufficiently small friction is made to collide with the object being tested, and the instantaneous value of the impact force is measured as the inertial force acting on the mass. The velocity and acceleration of the mass are measured using an optical interferometer. With this method, the relative combined standard uncertainty is estimated to be very small. The prospects for reducing the size and cost of the optical interferometer are also discussed.
介绍了一种利用悬浮质量法进行精密力测量的方法。在这种方法中,使用摩擦足够小的气动直线轴承悬浮的质量与被测物体碰撞,并测量作用力的瞬时值作为作用在质量上的惯性力。用光学干涉仪测量质量的速度和加速度。用该方法估计出的相对组合标准不确定度很小。讨论了减小光学干涉仪尺寸和成本的前景。
{"title":"Precision and Compact Dynamic Bending Tester","authors":"K. Maru, Y. Fujii","doi":"10.1109/ICCEE.2008.117","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.117","url":null,"abstract":"A method for precision force measurement by using the levitation mass method (LMM) is reviewed. In this method, a mass levitated using a pneumatic linear bearing with sufficiently small friction is made to collide with the object being tested, and the instantaneous value of the impact force is measured as the inertial force acting on the mass. The velocity and acceleration of the mass are measured using an optical interferometer. With this method, the relative combined standard uncertainty is estimated to be very small. The prospects for reducing the size and cost of the optical interferometer are also discussed.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132699762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A 3 Levels Image Segmentation with Integrated Objects and Local Information 基于目标和局部信息的三级图像分割
Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.13
L. Sheng, Z. Gong, Zhenhua Chen, Shen Long
This paper introduces a new integrated method for segmenting image which imitates the human observing mechanism. Human firstly pays attention to large objects, then some details, and lastly the concerned details. At the first stage of the algorithm discontinuous edges are detected in the original image, then cut equidistantly to some segmentations, and the end points of segmentations are gathered into a points set. At the second stage a constrained Delaunay triangulation is yielded from the points set and then a graph is attained too. Graph cut algorithm such as minimum spanning tree (MST), is then performed to assemble triangles into regions. At the last stage, the obtained regions are projected into the original image and region boundaries are refined by snake model. Experimental results show that edges are accurate, and a good spatial coherence is attained.
本文介绍了一种模拟人体观察机制的图像分割方法。人类首先关注的是大的物体,然后是一些细节,最后是相关的细节。在算法的第一阶段,在原始图像中检测不连续的边缘,然后对一些分割进行等距切割,并将分割的端点聚集成一个点集。在第二阶段,从点集得到约束Delaunay三角剖分,然后得到图。然后使用最小生成树(MST)等图切算法将三角形组装成区域。最后,将得到的区域投影到原始图像中,并利用蛇形模型对区域边界进行细化。实验结果表明,该方法边缘精度高,具有良好的空间相干性。
{"title":"A 3 Levels Image Segmentation with Integrated Objects and Local Information","authors":"L. Sheng, Z. Gong, Zhenhua Chen, Shen Long","doi":"10.1109/ICCEE.2008.13","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.13","url":null,"abstract":"This paper introduces a new integrated method for segmenting image which imitates the human observing mechanism. Human firstly pays attention to large objects, then some details, and lastly the concerned details. At the first stage of the algorithm discontinuous edges are detected in the original image, then cut equidistantly to some segmentations, and the end points of segmentations are gathered into a points set. At the second stage a constrained Delaunay triangulation is yielded from the points set and then a graph is attained too. Graph cut algorithm such as minimum spanning tree (MST), is then performed to assemble triangles into regions. At the last stage, the obtained regions are projected into the original image and region boundaries are refined by snake model. Experimental results show that edges are accurate, and a good spatial coherence is attained.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134519978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Steganographic Approach by Using Session Based Stego-Key, Genetic Algorithm and Variable Bit Replacement Technique 基于会话隐写密钥、遗传算法和可变比特替换技术的隐写方法
Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.108
T. Bhattacharya, S. Bhowmik, S. Chaudhuri
This paper presents a new approach of steganography. The secret image is firstly perturbed by Stego-Key (SK) and again perturbed by a genetically generated, good, session based transposition operator (TO). In the next step this perturbed secret image is embedded within the host image by variable bit replacement using a hash function. At the time of extraction of secret image firstly perturbed image is extracted then by reverse engineering with the session based TO and SK the secret image is obtained.
本文提出了一种新的隐写方法。秘密图像首先由Stego-Key (SK)进行扰动,然后再由遗传生成的、良好的、基于会话的转置算子(TO)进行扰动。在下一步中,通过使用哈希函数进行可变位替换,将这个被扰动的秘密图像嵌入到主机图像中。在提取秘密图像时,首先提取扰动图像,然后利用基于TO和SK的会话进行逆向工程,得到秘密图像。
{"title":"A Steganographic Approach by Using Session Based Stego-Key, Genetic Algorithm and Variable Bit Replacement Technique","authors":"T. Bhattacharya, S. Bhowmik, S. Chaudhuri","doi":"10.1109/ICCEE.2008.108","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.108","url":null,"abstract":"This paper presents a new approach of steganography. The secret image is firstly perturbed by Stego-Key (SK) and again perturbed by a genetically generated, good, session based transposition operator (TO). In the next step this perturbed secret image is embedded within the host image by variable bit replacement using a hash function. At the time of extraction of secret image firstly perturbed image is extracted then by reverse engineering with the session based TO and SK the secret image is obtained.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"365 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114501361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Modeling of Equipment Maintenance Support System Domain Library and its Application in HLA Simulation System 装备维修保障系统领域库建模及其在HLA仿真系统中的应用
Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.182
C. Qu, Liu Zhang, Yongli Yu, Songshan Wang
Applying domain engineering, the equipment maintenance support system is analyzed and the essential entities are abstracted. Using the executable specification tool-ExSpect, a domain library is constructed, including maintenance organization module, distribution stock module, transport unit module and management department module. By constructing the simulation Object Model (SOM) and the Interface with Run-Time Infrastructure (RTI), the modules are applied on the High Level Architecture (HLA).
应用领域工程对装备维修保障系统进行了分析,抽象出其基本实体。利用可执行规范工具expect构建了一个领域库,包括维护组织模块、配送库存模块、运输单元模块和管理部门模块。通过构建仿真对象模型(SOM)和运行时基础结构接口(RTI),将这些模块应用于高级体系结构(HLA)。
{"title":"Modeling of Equipment Maintenance Support System Domain Library and its Application in HLA Simulation System","authors":"C. Qu, Liu Zhang, Yongli Yu, Songshan Wang","doi":"10.1109/ICCEE.2008.182","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.182","url":null,"abstract":"Applying domain engineering, the equipment maintenance support system is analyzed and the essential entities are abstracted. Using the executable specification tool-ExSpect, a domain library is constructed, including maintenance organization module, distribution stock module, transport unit module and management department module. By constructing the simulation Object Model (SOM) and the Interface with Run-Time Infrastructure (RTI), the modules are applied on the High Level Architecture (HLA).","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123386943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Approach to Motion Vector Estimation 一种新的运动矢量估计方法
Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.177
H. Ebrahimi, A. Nilchi, H. Vahdat-Nejad
Block matching has been widely used for block motion estimation; however most of the block matching algorithms impose heavy computational load to the system, and require much time for execution. This problem prevents using them in time critical applications. In this paper, a new approach to block matching technique is presented, which has small computational complexity as well as high accuracy. The main assumption of the algorithm is that, all the pixels of a block move equally by a linear motion. Experimental results show the feasibility and effectiveness of the proposed algorithm.
块匹配被广泛应用于块运动估计;然而,大多数块匹配算法的计算量较大,且执行时间较长。这个问题妨碍了在时间要求严格的应用程序中使用它们。本文提出了一种新的块匹配方法,该方法计算量小,精度高。该算法的主要假设是,一个块的所有像素通过线性运动均匀移动。实验结果表明了该算法的可行性和有效性。
{"title":"A New Approach to Motion Vector Estimation","authors":"H. Ebrahimi, A. Nilchi, H. Vahdat-Nejad","doi":"10.1109/ICCEE.2008.177","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.177","url":null,"abstract":"Block matching has been widely used for block motion estimation; however most of the block matching algorithms impose heavy computational load to the system, and require much time for execution. This problem prevents using them in time critical applications. In this paper, a new approach to block matching technique is presented, which has small computational complexity as well as high accuracy. The main assumption of the algorithm is that, all the pixels of a block move equally by a linear motion. Experimental results show the feasibility and effectiveness of the proposed algorithm.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126503659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Task Assignment for Heterogeneous Multiprocessors Using Re-Excited Particle Swarm Optimization 基于重激励粒子群优化的异构多处理器任务分配
Pub Date : 2008-12-20 DOI: 10.1109/ICCEE.2008.41
Mohamed B. Abdelhalim
The problem of determining whether a set of periodic tasks can be assigned to a set of heterogeneous processors in such a way that all timing constraints are met has been shown, in general, to be NP-hard. This paper presents a modified algorithm based on the Particle Swarm Optimization (PSO) heuristic for solving this problem. The modified version is called Re-Excited PSO. Experimental results show that our approach outperform the major existing methods. In addition to being able to search for a feasible assignment solution, our PSO approach can further optimize the solution to reduce its energy consumption as well as to obtain good tradeoff between minimizing the design makespan as well as energy consumption.
一般来说,确定一组周期性任务能否以满足所有时间约束的方式分配给一组异构处理器的问题已被证明是np困难的。本文提出了一种基于粒子群优化(PSO)启发式的改进算法来解决这一问题。修改后的版本称为重激PSO。实验结果表明,该方法优于现有的主要方法。除了能够寻找可行的分配方案外,我们的PSO方法还可以进一步优化解决方案,以减少其能耗,并在最小化设计完工时间和能耗之间取得良好的权衡。
{"title":"Task Assignment for Heterogeneous Multiprocessors Using Re-Excited Particle Swarm Optimization","authors":"Mohamed B. Abdelhalim","doi":"10.1109/ICCEE.2008.41","DOIUrl":"https://doi.org/10.1109/ICCEE.2008.41","url":null,"abstract":"The problem of determining whether a set of periodic tasks can be assigned to a set of heterogeneous processors in such a way that all timing constraints are met has been shown, in general, to be NP-hard. This paper presents a modified algorithm based on the Particle Swarm Optimization (PSO) heuristic for solving this problem. The modified version is called Re-Excited PSO. Experimental results show that our approach outperform the major existing methods. In addition to being able to search for a feasible assignment solution, our PSO approach can further optimize the solution to reduce its energy consumption as well as to obtain good tradeoff between minimizing the design makespan as well as energy consumption.","PeriodicalId":365473,"journal":{"name":"2008 International Conference on Computer and Electrical Engineering","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129701132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
2008 International Conference on Computer and Electrical Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1