0% Complete
English
صفحه اصلی
/
یازدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A Potential Solutions-Based Parallelized GA for Application Graph Mapping in Reconfigurable Hardware
نویسندگان :
Seyed Mehdi Mohtavipour
1
Hadi Shahriar Shahhoseini
2
1- Iran University of Science and Technology
2- Iran University of Science and Technology
کلمات کلیدی :
High-Performance Computing, Reconfigurable Hardware, Application Compilation, Evolutionary Algorithms, Smart Searching
چکیده :
High-performance computing systems including Reconfigurable Hardware (RH) such as Field Programmable Gate Array (FPGA) proved a significant impact on the speed of application execution with useful reconfiguration and parallelism attributes. To make one application executable on RH, it is required to perform some heavy computational compilation preprocessing phases. In this paper, we aim to reduce compilation overhead in the NP-hard problem of the mapping phase by utilizing a novel parallelized Genetic Algorithm (GA) which is based on potential solutions in the search space. In the search space of possible solutions, we analytically separate weak and potential solutions to guide the GA for reaching the optimal solution faster. Moreover, this separation has been carried out independently to add parallelism into our GA and also, to switch between search spaces for keeping the generalization of GA exploration. Comparison results showed that our approach could make a considerable gap at the starting points of solution searching and therefore, found the optimal solution in a more reasonable time.
لیست مقالات
لیست مقالات بایگانی شده
A Graph Attention-Based Autoencoder for Critical Path Anomaly Detection in Microservices
Mahdi Naderi - Hossein Momeni - Shayan Shahini
کنترل کیفیت غیرمتمرکز مبتنی بر هوش ترکیبی در سیستمهای مشارکتی برخط
مهدیه طالب زاده - هاله امین طوسی - محمد اله بخش
Improving Fog Computing Scalability in Software Defined Network using Critical Requests Prediction in IoT
Hajar Ghanbari
ارائه راهکاری جهت مقابله با حملات DoS در شبکه های نرم افزارمحور
ویدا هاشمی - احمد بختیاری شهری - رضا جاویدان
Cryptanalysis of two password authenticated key exchange schemes
Mohammad Ali Poorafsahi - Hamid Mala
An ESB-based Architecture for Authentication as a Service Through Enterprise Application Integration
Masoumeh Hashemi - Mehdi Sakhaei-nia - Morteza Yousef Sanati
IT-based and Non-IT-based methods to separate and collect waste
Hoda Harati - Farzad Haghighi-Rad - Reza Yousefi Zenouz
AOV-IDS: Arithmetic Optimizer with Voting classifier for Intrusion Detection System
Amir Soltany Mahboob - Mohammad Reza Ostadi Moghaddam - Shima Yousefi
Enhancing kNN-Based Intrusion Detection with Differential Evolution with Auto-Enhanced Population Diversity
Zohre Karimi - Zeinab Torabi
An integrated approach for estimating software cost estimation using Adaptive Neuro-Fuzzy Inference System and the Grey Wolf Optimization algorithm
Maryam Karimi - Taghi Javdani Gandomani - Mahdi Mosleh
بیشتر
ثمین همایش، سامانه مدیریت کنفرانس ها و جشنواره ها - نگارش 42.2.4