Study the impact of using Lock-free buffer to communicate the DOACROSS loop iterations EHA Alwan Journal ofB abylon University/Pure and Applied Sciences 197 Views
Communication dependency overhead becomes the biggest obstacle that facing the parallelizing loops containing loop-carried dependencies such us DOACROSSloop. Although of a substantial researcheshad been devoted tothis field, the problem still far from solve
|
Spam Email Image Classification Based on Text and Image Features 268 Views
Spam Email Image Classification Based on Text and Image Features
|
Enhanced Blowfish Algorithm for Image Encryption Based on Chaotic Map 258 Views
Enhanced Blowfish Algorithm for Image Encryption Based on Chaotic Map
|
Text Region Extraction for Noisy Spam Image 251 Views
Text Region Extraction for Noisy Spam Image
|
Iris Recognition System Based on Lifting Wavelet 226 Views
Iris Recognition System Based on Lifting Wavelet
|
The classification of heart sound by using ANNS 224 Views
Heart auscultation (the interpretation by a physician of heart sounds) is a fundamental component in cardiac diagnosis. It is, however, a difficult skill to acquire. In this work, we present a study for a system intended to aid in heart sound classification based on a FFT of the sounds and a neural network
|
Color Image Compression Using DPCM with DCT, DWT and Quadtree Coding Scheme 243 Views
Color Image Compression Using DPCM with DCT, DWT and Quadtree Coding Scheme
|
Parallel Genetic Algorithm for Optimizing Compiler Sequences Ordering 200 Views
Recent compilers provided many of optimization passes, thus even for expert programmers it is really hard to know which compiler optimization among several optimizations passes can improve program performance. Moreover, the search space for optimization sequences is very huge
|
Iris identification system based on RLM texture features 174 Views
Iris identification system based on RLM texture features
|
Using Machine Learning to Predict the Sequences of Optimization Passes 159 Views
Recent compilers provided many of optimization passes, thus even for expert programmers it is really hard to know which compiler optimization among several optimizations passes can improve program performance. Moreover, the search space for optimization sequences is very huge
|
Using Machine Learning to Predict the Sequences of Optimization Passes 143 Views
Recent compilers provided many of optimization passes, thus even for expert programmers it is really hard to know which compiler optimization among several optimizations passes can improve program performance. Moreover, the search space for optimization sequences is very huge
|
Selecting Best CPU frequency for energy saving in cluster using genetic algorithm 138 Views
Dynamic voltage and frequency scaling (DVFS) is a technique mainly used for reducing the consumed energy of computer’s processor. Its only drawback detracting the performance of parallel application when executing them over parallel platform.
|
In Predictable Outcome of Some Complex Function on Space 176 Views
The Main advantage of this work is to concentrate on the outcome of the function as a function of ( ) , ( ) . This type of work has been studied deeply by [HIL , 12] . Here , we see that the outcomes of the function are depending on the of the function ( ) . More deeply , s value will appear as a matrix of zero triangle values depending 0n the positive of on the real line .
|
Multi-objective Optimization of Grid Computing for Performance, Energy and Cost 135 Views
In this paper, new multi-objective optimization algorithm is proposed. It optimizes the execution time, the energy consumption and the cost of booked nodes in the grid architecture at the same time.
|
Programs features clustering to find optimization sequence using genetic algorithm 140 Views
Finding the best optimization sequence order that can improve the performance for even a simple program is not an easy task.
|
Wavelet transform based technique for text image localization 188 Views
Wavelet transform based technique for text image localization
|
Wavelet transform based technique for text image localization 173 Views
البحث العلمي
|
Finding a Good Global Sequence using Multi-Level Genetic Algorithm 134 Views
Trying all the optimization sequences manually to find out a
|
Enhancing Replacement Policy of Content-Centric Networking to Support Reaction toward Natural Disaster 248 Views
Replacement policy in Content-Centric Networking (CCN) is a necessary and current, function as an important part in Interest packet caching. Pending Interest Table (PIT) is the main and core cache tables in CCN and plays a signi?cant role for recording the information of Interest packets that are forwarded but are still waiting for matching with incoming Data packets. However, PIT management is more fundamental with regard to CCN operations for better memory ef?ciency. The PIT size determination of the forwarding system is a difficult problem in PIT management. Due to the limited PIT sizing, PIT replacement is utilized to remove the current entry from PIT and constructing a new space for the incoming entry to it. In a disaster area, this problem is due to the massive Interest packet that generating by survivors from the disaster and rescuers. The PIT over?ow could be subjected due to use of long Interest lifetimes that would simultaneously increase the number of entries in the PIT. Thus particularly when there is no flexible replacement policy, hence affecting PIT performance. Therefore, the ultimate aim of this paper is to develop the replacement policy that can deal with this problem. The proposed policy is a PIT management based on CCN PIT replacement policy for managing the PIT during a natural disaster, which can lead to mitigating PIT over?owing. The results showed the overall scenarios, the proposed policy better PIT memory usage as well as decreasing the Interest drop, delay time, Interest lifetime and Interest retransmission. A positive signi?cance in?uence in this work would be to presents a formulate a rule as a function which can decrease the delay and thus be leading to increasing PIT utilization, which will be very much useful for survivors, emergency rescue teams as well as emergency operation centers.
|
A Comparative Study of Image Steganography Based on Edge Detection 174 Views
Information security has become the main concern of the most famous researchers and the focus of their attention, as they are constantly trying to find the best and safest ways to transfer information
|