Application of Improved Differential Evolution Algorithm in solving Container-packing problemsApplication of Improved Differential Evolution Algorithm in solving Container-packing problems
Mathematical Modeling Innovative Practice Base, Zhuhai College Jinan University, Zhuhai, China 519070; 2Department of Computer Science and Technology, Jinan University, Zhuhai, China 519070
1.34 Mb. 31
read
Co-processing spmd computation on cpus and gpus clusterCo-processing spmd computation on cpus and gpus cluster
Our analytic model is derived from the roofline model, and therefore it can be applied to a wider range of spmd applications and hardware devices. The experimental results of the c-means, gmm
87.01 Kb. 5
read
Energy-Aware Management for Cluster-Based Sensor NetworksEnergy-Aware Management for Cluster-Based Sensor Networks
C protocol and discuss algorithms for assigning time slots for the communicating sensor nodes. Simulation results show an order of magnitude enhancement in the time to network partitioning
112.31 Kb. 8
read
Human-Robot Interaction in a Robot Theatre that LearnsHuman-Robot Interaction in a Robot Theatre that Learns
Casey Montgomery, Thuan Pham, Randon Stasney, Ram Bhattarai, Mohamed Abidalrekab, Samuel Salin, Jelon Anderson, Justin Morgan, Surendra Maddula, Saly Hakkoum, Dheerajchand Vummidi, Nauvin Ghorashian, Aditya Channamallu, Alvin Lin, Melih
189.05 Kb. 3
read
Load-Balanced Clustering in Wireless Sensor NetworksLoad-Balanced Clustering in Wireless Sensor Networks
In this paper we propose an algorithm to network these sensors in to well define clusters with less-energy-constrained gateway nodes acting as clusterheads, and balance load among these gateways
46.8 Kb. 1
read
Performance Evaluation of Load-Balanced Clustering of Wireless Sensor NetworksPerformance Evaluation of Load-Balanced Clustering of Wireless Sensor Networks
To evaluate the efficiency of our approach we have studied the performance of sensor networks applying various different routing protocols. Simulation results shows that irrespective of the routing protocol used
58.9 Kb. 1
read
Security Attacks on the Wavelet Transform and Singular Value Decomposition Image WatermarkingSecurity Attacks on the Wavelet Transform and Singular Value Decomposition Image Watermarking
Department of Computer Science and Engineering,m s ramaiah Institute of technology
63.63 Kb. 1
read
Mechanical behaviors of friction stir spot welded jointMechanical behaviors of friction stir spot welded joint
M. A. M. Hossain1*, M. T. Hasan1, S. T. Hong1, M. Miles2, H. H. Cho3 and H. N. Han3
9.09 Mb. 22
read

  1




The database is protected by copyright ©ininet.org 2024
send message

    Main page