539,234 research outputs found

    Logical topology design for WDM networks using tabu search.

    Get PDF
    In this thesis the problem of Logical Topology Design for WDM Networks has been considered. Optical networks form the backbone of our communication needs, so logical topology design forms a critical part of network design. The physical topology consists of nodes and fiber optic links. Lightpaths are set up on physical topology, which represent a optical connection between two end nodes. The maximum total traffic on a logical link gives us the congestion of the network. The tabu search meta-heuristic opens interesting avenue to expedite finding the optimal logical topology. For a given physical topology, and traffic pattern our objective is to optimize logical topology, using tabu search so as to minimize the network congestion.Dept. of Computer Science. Paper copy at Leddy Library: Theses & Major Papers - Basement, West Bldg. / Call Number: Thesis2006 .S66. Source: Masters Abstracts International, Volume: 45-01, page: 0365. Thesis (M.Sc.)--University of Windsor (Canada), 2006

    Close range three-dimensional position sensing using stereo matching with Hopfield neural networks.

    Get PDF
    In recent years Vision Systems have found their ways into many real-world applications. This includes such fields as surveillance and tracking, computer graphics and various factory settings such as assembly line inspection and object manipulation. The application of Computer Vision techniques to factory automation, Machine Vision, is a growing field. However in most Machine Vision systems an algorithm is needed to infer 3D information regarding the objects in the field of view. Such a task can be accomplished using a Stereo Vision algorithm. In this thesis a new Machine Vision Algorithm for Close-Range Position Sensing is presented where a Hopfield Neural Network is used for the Stereo Matching stage: stereo Matching is formulated as an energy minimization task which is accomplished using the Hopfield Neural Networks. Various other important aspects of this Vision System are discussed including camera calibration and objects localization. Source: Masters Abstracts International, Volume: 45-01, page: 0423. Thesis (M.A.Sc.)--University of Windsor (Canada), 2006

    Optimization strategies for two-tiered sensor networks.

    Get PDF
    Sensor nodes are tiny, low-powered and multi-functional devices operated by lightweight batteries. Replacing or recharging batteries of sensor nodes in a network is usually not feasible so that a sensor network fails when the battery power in critical node(s) is depleted. The limited transmission range and the battery power of sensor nodes affect the scalability and the lifetime of sensor networks. Recently, relay nodes, acting as cluster heads, have been proposed in hierarchical sensor networks. The placement of relay nodes in a sensor network, such that all the sensor nodes are covered using a minimum number of relay nodes is a NP-hard problem. We propose a simple strategy for the placement of relay nodes in a two-tiered network that ensures connectivity and fault tolerance. We also propose two ILP formulations for finding the routing strategy so that the lifetime of any relay node network may be maximized.Dept. of Computer Science. Paper copy at Leddy Library: Theses & Major Papers - Basement, West Bldg. / Call Number: Thesis2006 .B37. Source: Masters Abstracts International, Volume: 45-01, page: 0348. Thesis (M.Sc.)--University of Windsor (Canada), 2006

    Learning practices and teaching methods as factors in gender inequity in undergraduate computer science programs.

    Get PDF
    The primary purpose of this study is to detect student difficulties in adapting to the undergraduate computer science program. The research was conducted in the Department of Computer Science at a medium sized urban university in Ontario. Subjects were 16 students (ten males and six females) from the first to the third year of study and two professors. For this research mixed methods methodologies (QUAL+quan) were used. Qualitative methods were preponderant and were used in order to explore differences and difficulties both genders have in computer science program and modalities to deal with them. Quantitative methods were used to compare and analyze some of the details. Most female students had initial experience in using computers but few of them had previous experience in programming. During the program they were focused more on academic achievements but they were not oriented to developing practical projects and preparing for the realities of work in the IT industry. In relation to teaching, female students were more sensitive to teaching than male students. During the program, anxiety, lack of confidence and underachievement of female students progressed. The research revealed that the majority of males had initial experience in computer programming. During the program, they acquired more confidence and greater experience in programming and had more mature thoughts about the IT career than their female colleagues. Male students were oriented more on achieving real experience. Due to the fact that males were working in different informal settings, this helped them to extend and diversify their experience. Male students were more independent of teacher performances, being more willing to take ownership of learning process, especially in cases when teaching was not effective. Male students easily formed social networks that were able to help them. Female students had better social and communicational skills. However, because they were small in number and lacked initiative and support, they failed to coagulate social networks able to support themselves. Related feminism approaches, the author appreciate that liberal feminism is most likely to succeed in preparing women for a traditionally male dominated workplace. Paper copy at Leddy Library: Theses & Major Papers - Basement, West Bldg. / Call Number: Thesis2006 .S76. Source: Masters Abstracts International, Volume: 45-01, page: 0045. Thesis (M.Ed.)--University of Windsor (Canada), 2006

    PWC-Net: CNNs for Optical Flow Using Pyramid, Warping, and Cost Volume

    Full text link
    We present a compact but effective CNN model for optical flow, called PWC-Net. PWC-Net has been designed according to simple and well-established principles: pyramidal processing, warping, and the use of a cost volume. Cast in a learnable feature pyramid, PWC-Net uses the cur- rent optical flow estimate to warp the CNN features of the second image. It then uses the warped features and features of the first image to construct a cost volume, which is processed by a CNN to estimate the optical flow. PWC-Net is 17 times smaller in size and easier to train than the recent FlowNet2 model. Moreover, it outperforms all published optical flow methods on the MPI Sintel final pass and KITTI 2015 benchmarks, running at about 35 fps on Sintel resolution (1024x436) images. Our models are available on https://github.com/NVlabs/PWC-Net.Comment: CVPR 2018 camera ready version (with github link to Caffe and PyTorch code

    Applications of Soft Computing in Mobile and Wireless Communications

    Get PDF
    Soft computing is a synergistic combination of artificial intelligence methodologies to model and solve real world problems that are either impossible or too difficult to model mathematically. Furthermore, the use of conventional modeling techniques demands rigor, precision and certainty, which carry computational cost. On the other hand, soft computing utilizes computation, reasoning and inference to reduce computational cost by exploiting tolerance for imprecision, uncertainty, partial truth and approximation. In addition to computational cost savings, soft computing is an excellent platform for autonomic computing, owing to its roots in artificial intelligence. Wireless communication networks are associated with much uncertainty and imprecision due to a number of stochastic processes such as escalating number of access points, constantly changing propagation channels, sudden variations in network load and random mobility of users. This reality has fuelled numerous applications of soft computing techniques in mobile and wireless communications. This paper reviews various applications of the core soft computing methodologies in mobile and wireless communications
    corecore