期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
The Case of Using Multiple Streams in Streaming 被引量:1
1
作者 Muhammad Abid Mughal Hai-Xia Wang Dong-Sheng Wang 《International Journal of Automation and computing》 EI CSCD 2013年第6期587-596,共10页
Off-chip replacement (capacity and conflict) and coherent read misses in a distributed shared memory system cause execution to stall for hundreds of cycles. These off-chip replacement and coherent read misses are re... Off-chip replacement (capacity and conflict) and coherent read misses in a distributed shared memory system cause execution to stall for hundreds of cycles. These off-chip replacement and coherent read misses are recurring and forming sequences of two or more misses called streams. Prior streaming techniques ignored reordering of misses and not-recently-accessed streams while streaming data. In this paper, we present stream prefetcher design that can deal with both problems. Our stream prefetcher design utilizes stream waiting rooms to store not-recently-accessed streams. Stream waiting rooms help remove more off-chip misses. Using trace based simulation% our stream prefetcher design can remove 8% to 66% (on average 40%) and 17% to 63% (on average 39%) replacement and coherent read misses, respectively. Using cycle-accurate full-system simulation, our design gives speedups from 1.00 to 1.17 of princeton application repository for shared-memory computers (PARSEC) workloads running on a distributed shared memory system with the exception of dedup and swaptions workloads. 展开更多
关键词 PREFETCHING stream first in first out (FIFO) princeton application repository for shared-memory computers (PARSEC) stream waiting rooms reordering of misses sequitur.
原文传递
Leveraging EfficientNetB3 in a Deep Learning Framework for High-Accuracy MRI Tumor Classification
2
作者 Mahesh Thyluru Ramakrishna Kuppusamy Pothanaicker +4 位作者 Padma Selvaraj Surbhi Bhatia Khan Vinoth Kumar Venkatesan Saeed Alzahrani Mohammad Alojail 《Computers, Materials & Continua》 SCIE EI 2024年第10期867-883,共17页
Brain tumor is a global issue due to which several people suffer,and its early diagnosis can help in the treatment in a more efficient manner.Identifying different types of brain tumors,including gliomas,meningiomas,p... Brain tumor is a global issue due to which several people suffer,and its early diagnosis can help in the treatment in a more efficient manner.Identifying different types of brain tumors,including gliomas,meningiomas,pituitary tumors,as well as confirming the absence of tumors,poses a significant challenge using MRI images.Current approaches predominantly rely on traditional machine learning and basic deep learning methods for image classification.These methods often rely on manual feature extraction and basic convolutional neural networks(CNNs).The limitations include inadequate accuracy,poor generalization of new data,and limited ability to manage the high variability in MRI images.Utilizing the EfficientNetB3 architecture,this study presents a groundbreaking approach in the computational engineering domain,enhancing MRI-based brain tumor classification.Our approach highlights a major advancement in employing sophisticated machine learning techniques within Computer Science and Engineering,showcasing a highly accurate framework with significant potential for healthcare technologies.The model achieves an outstanding 99%accuracy,exhibiting balanced precision,recall,and F1-scores across all tumor types,as detailed in the classification report.This successful implementation demonstrates the model’s potential as an essential tool for diagnosing and classifying brain tumors,marking a notable improvement over current methods.The integration of such advanced computational techniques in medical diagnostics can significantly enhance accuracy and efficiency,paving the way for wider application.This research highlights the revolutionary impact of deep learning technologies in improving diagnostic processes and patient outcomes in neuro-oncology. 展开更多
关键词 Deep learning MRI brain tumor cassification EfficientNetB3 computational engineering healthcare technology artificial intelligence in medical imaging tumor segmentation NEURO-ONCOLOGY
在线阅读 下载PDF
Efficient Routing Protection Algorithm Based on Optimized Network Topology
3
作者 Haijun Geng Zikun Jin +7 位作者 Jiangyuan Yao Han Zhang Zhiguo Hu Bo Yang Yingije Guo Wei Wang Qidong Zhang Guoao Duan 《Computers, Materials & Continua》 SCIE EI 2022年第9期4525-4540,共16页
Network failures are unavoidable and occur frequently.When the network fails,intra-domain routing protocols deploying on the Internet need to undergo a long convergence process.During this period,a large number of mes... Network failures are unavoidable and occur frequently.When the network fails,intra-domain routing protocols deploying on the Internet need to undergo a long convergence process.During this period,a large number of messages are discarded,which results in a decline in the user experience and severely affects the quality of service of Internet Service Providers(ISP).Therefore,improving the availability of intra-domain routing is a trending research question to be solved.Industry usually employs routing protection algorithms to improve intra-domain routing availability.However,existing routing protection schemes compute as many backup paths as possible to reduce message loss due to network failures,which increases the cost of the network and impedes the methods deployed in practice.To address the issues,this study proposes an efficient routing protection algorithm based on optimized network topology(ERPBONT).ERPBONT adopts the optimized network topology to calculate a backup path with the minimum path coincidence degree with the shortest path for all source purposes.Firstly,the backup path with the minimum path coincidence with the shortest path is described as an integer programming problem.Then the simulated annealing algorithm ERPBONT is used to find the optimal solution.Finally,the algorithm is tested on the simulated topology and the real topology.The experimental results show that ERPBONT effectively reduces the path coincidence between the shortest path and the backup path,and significantly improves the routing availability. 展开更多
关键词 Routing protection algorithm network availability network failure shortest path backup path
在线阅读 下载PDF
Robust Sensor—Less PR Controller Design for 15-PUC Multilevel Inverter Topology with Low Voltage Stress for Renewable Energy Applications
4
作者 K.Naga Venkata Siva Damodhar Reddy +3 位作者 P.Krishna Murthy Kiran Kumar Pulamolu M.Dharani T.Venkatakrishnamoorthy 《Energy Engineering》 2026年第1期221-242,共22页
Conventional multilevel inverters often suffer from high harmonic distortion and increased design complexity due to the need for numerous power semiconductor components,particularly at elevated voltage levels.Addressi... Conventional multilevel inverters often suffer from high harmonic distortion and increased design complexity due to the need for numerous power semiconductor components,particularly at elevated voltage levels.Addressing these shortcomings,thiswork presents a robust 15-level PackedUCell(PUC)inverter topology designed for renewable energy and grid-connected applications.The proposed systemintegrates a sensor less proportional-resonant(PR)controller with an advanced carrier-based pulse width modulation scheme.This approach efficiently balances capacitor voltage,minimizes steady-state error,and strongly suppresses both zero and third-order harmonics resulting in reduced total harmonic distortion and enhanced voltage regulation.Additionally,a novel switching algorithm simplifies the design and implementation,further lowering voltage stress across switches.Extensive simulation results validate the performance under various resistive and resistive-inductive load conditions,demonstrating compliance with IEEE-519 THD standards and robust operation under dynamic changes.The proposed sensorless PR-controlled 15-PUC inverter thus offers a compelling,cost-effective solution for efficient power conversion in next-generation renewable energy systems. 展开更多
关键词 PUC packed U cell MLI multilevel inverter SLC sensorless controller PR proportional resonant controller PD phase disposition THD total harmonic distortion
在线阅读 下载PDF
变形网格结构的快速评估算法
5
作者 Song Chen Xian-Long Hong +3 位作者 She-Qin Dong Yu-Chun Ma Chung-Kuan Cheng Jun Gu 《Journal of Computer Science & Technology》 SCIE EI CSCD 2004年第C00期99-99,共1页
随着超大规模集成电路技术的进步,集成电路的复杂性在急剧增加。分级设计和IP(知识产权)重用技术变得极为重要。因此,面向宏模块布局的布图规划/布局技术在近10年来成为VLSI设计自动化领域的研究热点。即使简单的矩形放置问题(将n个矩... 随着超大规模集成电路技术的进步,集成电路的复杂性在急剧增加。分级设计和IP(知识产权)重用技术变得极为重要。因此,面向宏模块布局的布图规划/布局技术在近10年来成为VLSI设计自动化领域的研究热点。即使简单的矩形放置问题(将n个矩形放置在一个平面的矩形区域内。 展开更多
关键词 布图规划 超大规模集成电路 模块布局 VLSI设计 IP 网格结构 平面 重用 矩形区域 自动化
原文传递
Studies on Algorithms for Self-StabilizingCommunication Protocols
6
作者 LI Layuan LI Chunlin 《Journal of Computer Science & Technology》 SCIE EI CSCD 1999年第6期606-613,共8页
in this paper the algorithms for self-stabilizing communication protocols are studied.First some concepts and a formal method for describing theproposed algorithms are described,then an improved algorithm for achievin... in this paper the algorithms for self-stabilizing communication protocols are studied.First some concepts and a formal method for describing theproposed algorithms are described,then an improved algorithm for achieving globalstates is presented.The study shows that the improved algorithm can be appliedto obtain the global states in the case of a loss of cooperation of the different processes in the protocol,which can be used as a recovery point that will be used bythe following recovery procedure.Thus,the improved algorithm can be used toself-stabilize a communication protocol.Meanwhile,a recovery algorithm for selfstabilizing communication protocols is presented.After a failure is detected,allProcesses can eventually know the error.The recovery algorithm uses the contextualinformation exchanged during the progress of the protocol and recorded on the stablememory.The proof of correctness and analysis of complexity for these algorithmshave been made.The availability and efficiency of the algorithms have been verifiedby illustrating the example protocols.Finally,some conclusions and remarks aregiven. 展开更多
关键词 communication protocol SELF-STABILIZATION global state recoveryalgorithm multimedia communication
原文传递
MCC: A Message and Command Correlation Method for Identifying New Interactive Protocols via Session Analyses
7
作者 Chenglong Li Yibo Xue +1 位作者 Yingfei Dong Dongsheng Wang 《Tsinghua Science and Technology》 EI CAS 2012年第3期344-353,共10页
Traffic classification is critical to effective network management. However, more and more pro- prietary, encrypted, and dynamic protocols make traditional traffic classification methods less effective. A Message and ... Traffic classification is critical to effective network management. However, more and more pro- prietary, encrypted, and dynamic protocols make traditional traffic classification methods less effective. A Message and Command Correlation (MCC) method was developed to identify interactive protocols (such as P2P file sharing protocols and Instant Messaging (IM) protocols) by session analyses. Unlike traditional packet-based classification approaches, this method exploits application session information by clustering packets into application messages which are used for further classification. The efficacy and accuracy of the MCC method was evaluated with real world traffic, including P2P file sharing protocols Thunder and Bit- Torrent, and IM protocols QQ and GTalk. The tests show that the false positive rate is less than 3% and the false negative rate is below 8%, and that MCC only needs to check 8.7% of the packets or 0.9% of the traffic. Therefore, this approach has great potential for accurately and quickly discovering new types of interactive application protocols. 展开更多
关键词 traffic classification SESSION network management correlation INTERACTIVE
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部