• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2619
  • 941
  • 381
  • 347
  • 331
  • 101
  • 66
  • 49
  • 40
  • 36
  • 34
  • 32
  • 32
  • 27
  • 26
  • Tagged with
  • 5995
  • 1459
  • 890
  • 730
  • 724
  • 706
  • 494
  • 493
  • 482
  • 453
  • 421
  • 414
  • 386
  • 366
  • 342
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Simulated Overloading using Generic Functions in Scheme

Cox, Anthony January 1997 (has links)
This thesis investigates extending the dynamically-typed, functional programming language Scheme, with simulated overloading in order to permit the binding of multiple, distributed defnitions to function names. Overloading facilitates the use of an incremental style of programming in which functions can be defined with a base behaviour and then extended with additional behaviour as it becomes necessary to support new data types. A technique is demonstrated that allows existing functions to be extended, without modifcation, therefore improving code reuse. Using the primitives provided by Scheme, it is possible to write functions that perform like the generic routines (functions) of the programming language EL1. These functions use the type of their arguments to determine, at run-time, the computation to perform. It is shown that by gathering the definitions for an overloaded function and building a generic routine, the language appears to provide overloading. A language extension that adds the syntax necessary to instruct the system to gather the distributed set of definitions for an overloaded function and incrementally build an equivalently applicable generic function is described. A simple type inference algorithm, necessary to support the construction of generic functions, is presented and detailed. Type inference is required to determine the domain of an overloaded function in order to generate the code needed to perform run-time overload resolution. Some limitations and possible extensions of the algorithm are discussed.
22

The EM Algorithm in Multivariate Gaussian Mixture Models using Anderson Acceleration

Plasse, Joshua H 25 April 2013 (has links)
Over the years analysts have used the EM algorithm to obtain maximum likelihood estimates from incomplete data for various models. The general algorithm admits several appealing properties such as strong global convergence; however, the rate of convergence is linear which in some cases may be unacceptably slow. This work is primarily concerned with applying Anderson acceleration to the EM algorithm for Gaussian mixture models (GMM) in hopes of alleviating slow convergence. As preamble we provide a review of maximum likelihood estimation and derive the EM algorithm in detail. The iterates that correspond to the GMM are then formulated and examples are provided. These examples show how faster convergence is experienced when the data are well separated, whereas much slower convergence is seen whenever the sample is poorly separated. The Anderson acceleration method is then presented, and its connection to the EM algorithm is discussed. The work is then concluded by applying Anderson acceleration to the EM algorithm which results in reducing the number of iterations required to obtain convergence.
23

A Primal-Dual Approximation Algorithm for the Concurrent Flow Problem

Nahabedian, Aaron Joseph 29 April 2010 (has links)
The multicommodity flow problem involves shipping multiple commodities simultaneously through a network so that the total flow over each edge does not exceed the capacity of that edge. The concurrent flow problem also associates with each commodity a demand, and involves finding the maximum fraction z, such that z of each commodity's demand can be feasibly shipped through the network. This problem has applications in message routing, transportation, and scheduling problems. It can be formulated as a linear programming problem, and the best known solutions take advantage of decomposition techniques for linear programming. Often, quickly finding an approximate solution is more important than finding an optimal solution. A solution is epsilon-optimal if it lies within a factor of (1+epsilon) of the optimal solution. We present a combinatorial approximation algorithm for the concurrent flow problem. This algorithm consists of finding an initial flow, and gradually rerouting this flow from more to less congested paths, until an epsilon-optimal flow is achieved. This algorithm theoretically runs much faster than linear programming based algorithms.
24

Projeto, análise e implementação de primitivas criptográficas simétricas eficientes usando a estratégia de trilha larga. / Sem título em inglês

Gazzoni Filho, Décio Luiz 27 February 2008 (has links)
Estendemos o trabalho de Vincent Rijmen e Joan Daemen na estratégia de trilha larga, uma metodologia de projeto para primitivas criptográficas simétricas eficientes e demonstravelmente resistentes às técnicas de criptanálise diferencial e linear. Preocupamo-nos principalmente com a melhoria na eficiência de primitivas projetadas de acordo com a estratégia de trilha larga. Investigamos duas linhas distintas de pesquisa: a aplicabilidade da técnica de bitslicing à implementação em software de primitivas baseadas na estratégia de trilha larga; e o projeto de S-boxes estruturadas com implementação eficiente em hardware e bitslicing, e especificamente, o uso de S-boxes invariantes por rotação, que exibem propriedades vantajosas para implementação. Também implementamos e otimizamos algumas primitivas criptográficas em plataformas de software selecionadas, para substanciar e aprimorar as afirmações de eficiência da estratégia de trilha larga. Ademais, aplicamos nosso conhecimento e técnicas propostas ao projeto de novas primitivas criptográficas altamente eficientes, em particular a função de hash MAELSTROM-0 e a cifra de bloco legada FUTURE. / We extend the work of Vincent Rijmen and Joan Daemen on the Wide Trail strategy, a design methodology for symmetric-key cryptographic primitives which are efficient and provably secure against differential and linear cryptanalysis. We concern ourselves mainly with improving the efficiency of primitives designed according to the Wide Trail strategy. To that end, we investigate two distinct lines of research: the applicability of the bitslicing technique to the software implementation of primitives based on the Wide Trail strategy; and the design of structured S-boxes with efficient implementation in hardware and bitslicing, and specifically, the use of rotation-symmetric S-boxes, which exhibit advantageous implementation properties. We also perform general implementation and optimization work on selected software platforms, to further realize the claims of efficiency of the Wide Trail strategy. Additionally, we apply our expertise and proposed techniques to the design of new highly-efficient cryptographic primitives, in particular the hash function MAELSTROM-0 and the legacy-level block cipher FUTURE.
25

A Genetic Algorithm for Fixture Synthesis and Variation

Huang, Shiping 31 May 2011 (has links)
"Concepts in manufacturing such as CIMS (Computer Integrated Manufacturing Systems), JIT (Just In Time), Lean Production, Virtual Manufacturing, and Flexible Fixturing have been proposed to meet the fundamental requirements of manufacturing - decrease the cost and satisfy the needs of customers. Fast fixture generation and fixture reusability are essential in the current manufacturing environment. The dissertation focuses on the models, methods, and algorithms for fixture synthesis and variation that satisfy the functional requirements specified by on-site industrial engineers. With the reusability of a fixture base combined with variation of other fixture components, fixture configuration can be rapidly adapted and accommodated to the new workpiece. The dissertation presents methods and algorithms for fixture base synthesis, which directly result in fixture reusability. Optimization functions are derived based on engineering requirements due to the mass production nature of automotive parts. Specific optimization algorithms are developed and their complexities, compared to other alternatives, are comprehensively evaluated according to different optimization functions. The fixture variation and reusability provide an engineering tool to rapidly generate and validate fixtures in production planning stage. It applies scientific reasoning methodology in combination with best knowledge of fixture designs, which heavily relies on designers' manufacturing knowledge and experience. It also provides means to bridge the gap between CAD and CAM integration and therefore reduces the new product and production development cycle time and cost while maintaining the quality of fixtures."
26

Efficient Algorithms for Load Shuffling in Split-Platform AS/RS

Hu, Yahong, Hsu, Wen Jing, Xu, Xiang 01 1900 (has links)
We address the issue of shuffling loads in Automated Storage/Retrieval Systems (AS/RS) in this paper. The objective is to pre-sort the loads into any specified locations in order to minimize the response time of retrievals. 1D, 2D and 3D AS/RS racks have been designed in order to achieve the shuffling efficiently. The shuffling algorithms are described in detail. The response time of retrieval, the lower and upper bounds of energy consumption are also derived. Results of the analysis and numerical experiments show that the shuffling algorithms are quite efficient. / Singapore-MIT Alliance (SMA)
27

A Simple But Effective Evolutionary Algorithm for Complicated Optimization Problems

Xu, Y.G., Liu, Guirong 01 1900 (has links)
A simple but effective evolutionary algorithm is proposed in this paper for solving complicated optimization problems. The new algorithm presents two hybridization operations incorporated with the conventional genetic algorithm. It takes only 4.1% ~ 4.7% number of function evaluations required by the conventional genetic algorithm to obtain global optima for the benchmark functions tested. Application example is also provided to demonstrate its effectiveness. / Singapore-MIT Alliance (SMA)
28

Multi-objective optimal design of steel trusses in unstructured design domains

Paik, Sangwook 12 April 2006 (has links)
Researchers have applied genetic algorithms (GAs) and other heuristic optimization methods to perform truss optimization in recent years. Although a substantial amount of research has been performed on the optimization of truss member sizes, nodal coordinates, and member connections, research that seeks to simultaneously optimize the topology, geometry, and member sizes of trusses is still uncommon. In addition, most of the previous research is focused on the problem domains that are limited to a structured domain, which is defined by a fixed number of nodes, members, load locations, and load magnitudes. The objective of this research is to develop a computational method that can design efficient roof truss systems. This method provides an engineer with a set of near-optimal trusses for a specific unstructured problem domain. The unstructured domain only prescribes the magnitude of loading and the support locations. No other structural information concerning the number or locations of nodes and the connectivity of members is defined. An implicit redundant representation (IRR) GA (Raich 1999) is used in this research to evolve a diverse set of near-optimal truss designs within the specified domain that have varying topology, geometry, and sizes. IRR GA allows a Pareto-optimal set to be identified within a single trial. These truss designs reflect the tradeoffs that occur between the multiple objectives optimized. Finally, the obtained Pareto-optimal curve will be used to provide design engineers with a range of highly fit conceptual designs from which they can select their final design. The quality of the designs obtained by the proposed multi-objective IRR GA method will be evaluated by comparing the trusses evolved with trusses that were optimized using local perturbation methods and by trusses designed by engineers using a trial and error approach. The results presented show that the method developed is very effective in simultaneously optimizing the topology, geometry, and size of trusses for multiple objectives.
29

Network Clustering in Vehicular Communication Networks

Li, Weiwei 25 August 2011 (has links)
This thesis proposes a clustering algorithm for vehicular communication networks. A novel clustering metric and an improved clustering framework are introduced. The novel clustering metric, network criticality, is a global metric on undirected graphs which quantifies the robustness of the graph against changes in environmental parameters, and point-to-point network criticality is also defined to measure the resistance between different points of a graph. We localize the notion of network criticality for a node of a vehicular network which can potentially be promoted as the cluster header. We use the localized notion of node criticality in conjunction with a universal link metric, Link Expiration Time (LET), to derive a clustering algorithm for the vehicular network. We employ a distributed multi-hop clustering algorithm based on the notion of network criticality. Simulation results show that the proposed clustering algorithm forms a more robust cluster structure.
30

Network Clustering in Vehicular Communication Networks

Li, Weiwei 25 August 2011 (has links)
This thesis proposes a clustering algorithm for vehicular communication networks. A novel clustering metric and an improved clustering framework are introduced. The novel clustering metric, network criticality, is a global metric on undirected graphs which quantifies the robustness of the graph against changes in environmental parameters, and point-to-point network criticality is also defined to measure the resistance between different points of a graph. We localize the notion of network criticality for a node of a vehicular network which can potentially be promoted as the cluster header. We use the localized notion of node criticality in conjunction with a universal link metric, Link Expiration Time (LET), to derive a clustering algorithm for the vehicular network. We employ a distributed multi-hop clustering algorithm based on the notion of network criticality. Simulation results show that the proposed clustering algorithm forms a more robust cluster structure.

Page generated in 0.0757 seconds