title_a stringlengths 27 199 | abstract_a stringlengths 43 1.02k | title_b stringlengths 30 199 | abstract_b stringlengths 39 1.02k | id int64 1 186k |
|---|---|---|---|---|
theoretical and practical analysis of the cockroach antenna | insects posses garden variety of traits, but for some which lack the ability of vision, their species would have been extinct long ago. through ingenuity of creation, these species adapted to the environment by developing antennas where they can use the principle of basic electromagnetics to feel the surrounding object... | microstrip antenna design handbook | thank you very much for downloading microstrip antenna design handbook. as you may know, people have search numerous times for their chosen books like this microstrip antenna design handbook, but end up in harmful downloads. rather than enjoying a good book with a cup of tea in the afternoon, instead they cope with som... | 201 |
the kth-best approach for linear bilevel multi-follower programming | the majority of research on bilevel programming has centered on the linear version of the problem in which only one leader and one follower are involved. this paper addresses linear bilevel multi-follower programming (blmfp) problems in which there is no sharing information among followers. it explores the theoretical ... | a multiple objective programming approach to linear bilevel multi-follower programming | in this paper, we investigate the relationship between a certain class of linear bilevel multifollower programming problems and multiple objective programming. we introduce two multiple objective linear programming problems with different objective functions and the same constraint region. we show that the extreme poin... | 202 |
gathering digital evidence in response to information security incidents | to effectively fight computer crime, it is necessay to locate criminal evidence, from within the computer and the network; this necessitates forensic enquiry so that the evidence will be secured in an appropriate manner, and will be acceptable in a court of law as proof of criminal behavior. digital evidence is data in... | measures of retaining digital evidence to prosecute computer-based cyber-crimes | with the rapid growth of computer and network systems in recent years, there has also been a corresponding increase in cyber-crime. cyber-crime takes many forms and has garnered much attention in the media, making information security a more urgent and important priority. in order to fight cyber-crime, criminal evidenc... | 203 |
finding domain specific collocations and concordances on the web | terminoweb is a web-based platform designed to find and explore specialized domain knowledge on the web. an important aspect of this exploration is the discovery of domain-specific collocations on the web and their presentation in a concordancer to provide contextual information. such information is valuable to a trans... | webbootcat: instant domain-specific corpora to support human translators | we present a web service to aid translators by quickly ::: producing corpora for specialist areas, in any of a range of ::: languages, from the web. the underlying bootcat tools have ::: already been extensively used: here, we present a version which ::: is easy for non-technical people to use as all they need do is ::... | 204 |
a compensation-based replenishment model for deteriorating items via simulated annealing method | in a competitive market environment, business seeks to reduce cost by using strategic integration. this study derives an inventory replenishment model for a two-echelon supply chain in which the retailer is a leader of product price and the supplier is a price-follower. we consider that market demand is affected by its... | inventory replenishment policy for a linear trend in demand—an analytical solution | the classical no-shortage inventory policy is examined for the case of a linear trend in demand. using methods of calculus a computationally simple procedure for determining the optimal times for replenishment of inventory is established. table extracts for the functions required are included. | 205 |
three engines to solve verification constraints of decimal floating-point operation | decimal floating-point designs require a verification process to prove that the design is in compliance with the ieee standard for floating-point arithmetic (ieee std 754-2008). our work represents three engines, the first engine for the verification of decimal addition-subtraction operation, the second for the verific... | verification of the decimal floating-point square root operation | decimal floating-point is a relatively recent addition to the ieee standard (ieee std 754-2008). there exist few verification techniques that can check whether software libraries or hardware designs are in compliance with the standard. our work presents a verification method to verify implementations of the decimal flo... | 206 |
detection of gene orthology based on protein-protein interaction networks | ortholog detection methods present a powerful approach for finding genes that participate in similar biological processes across different organisms, extending our understanding of interactions between genes across different pathways, and understanding the evolution of gene families. we exploit features derived from th... | authoritative sources in a hyperlinked environment | the network structure of a hyperlinked environment can be a rich source of information about the content of the environment, provided we have effective means for understanding it. we develop a set of algorithmic tools for extracting information from the link structures of such environments, and report on experiments th... | 207 |
tweeting questions in academic conferences: seeking or promoting information? | the fast growth of social media has reshaped the traditional way of human interaction and information seeking behavior, which draws research attention on characterizing the new information seeking paradigm. however, results from previous studies might not be well grounded under certain social settings. in this paper, w... | question identification on twitter | in this paper, we investigate the novel problem of automatic question identification in the microblog environment. it contains two steps: detecting tweets that contain questions (we call them "interrogative tweets") and extracting the tweets which really seek information or ask for help (so called "qweets") from interr... | 208 |
optimal relay selection algorithm for combining distance and social information in d2d cooperative communication networks | with the rapid growth of mobile data traffic demand, d2d relay technology is becoming an essential technology for the next generation mobile network. in order to select the optimal node in a shorter time, a cooperative d2d relay model considering the physical distance and social information is proposed. and then a thre... | compromised secrecy region with adaptive jamming for heterogeneous cellular networks and social relationship model | this work studies the security enhancement and social relationship model in heterogeneous d2d and cellular network with an adaptive jamming. different from traditional physical layer securities that optimize secrecy capacity, we investigate strategies based on reduction of compromised secrecy region (csr). specifically... | 209 |
compact fuzzy models through complexity reduction and evolutionary optimization | genetic algorithms (gas) and other evolutionary optimization methods to design fuzzy rules from data for systems modeling and classification have received much attention in recent literature. we show that different tools for modeling and complexity reduction can be favorably combined in a scheme with ga-based parameter... | new criteria for rule selection in fuzzy learning classifier systems | designing an effective criterion for selecting the best rule is a major problem in the process of implementing fuzzy learning classifier (flc) systems. conventionally confidence and support or combined measures of these are used as criteria for fuzzy rule evaluation. in this paper new entities namely precision and reca... | 210 |
design and implementation of logical topology in sensor network for an industrial stack monitoring | wireless sensor network (wsn) has gained worldwide attention in recent years. the design of a wsn depends significantly on the application. in sensor network design, physical and logical topology plays a major role. transfer information in real time means, to provide a required result in a bounded time. large-scale sen... | the design space of wireless sensor networks ∗ | in the recent past, wireless sensor networks have found their way into a wide variety of applications and systems with vastly varying requirements and characteristics. as a consequence, it is becoming increasingly difficult to discuss typical requirements regarding hardware issues and software support. this is particul... | 211 |
arena: the arena product family: enterprise modeling solutions | this paper introduces the arena suite of products for modeling, simulation, and optimization highlighting product architecture and technology features that are targeted toward successful deployment of simulation and arena throughout an enterprise. | interfacing simulation with costing software to drive the transformation from prototype manufacturing to high volume manufacturing | often companies are faced with the situation of "ramping-up" production of a new product. although this may seem like it should be a simple task, making the transition from a manufacturing environment that makes small volumes of some product well to an environment that must make large volumes well entails many decision... | 212 |
detecting corner using fuzzy similarity matrix | in real-time video stream application, a feature point detector is very necessary. stable feature points are useful in machine vision application. feature point detectors such as sift, harris and susan are good methods which extracted high quality features, but neither the harris detector nor the detection stage of sif... | susan—a new approach to low level image processing | this paper describes a new approach to low level image processing; in particular, edge and corner detection and structure preserving noise reduction. ::: ::: non-linear filtering is used to define which parts of the image are closely related to each individual pixel; each pixel has associated with it a local image regi... | 213 |
parallel http for video streaming in wireless networks | to stream video using http, a client device sequentiallyrequests and receives chunks of the video file fromthe server over a tcp connection. it is well-known that tcpperforms poorly in networks with high latency and packet losssuch as wireless networks. on mobile devices, in particular, usinga single tcp connection for... | improving tcp/ip performance over wireless networks | tcp is a reliable transport protocol tuned to perform well intraditional networks made up of links with low bit-error rates.networks with higher bit-error rates, such as those with wirelesslinks and mobile hosts, violate many of the assumptions made bytcp, causing degraded end-to-end performance. in tbis paper, wedescr... | 214 |
load balancing based channel assignment in multicast wireless mesh network | wireless mesh network is an emerging technology for the next generation wireless internet. it works as a backhaul for other wireless network. there are number of issues which need to be considering in wireless mesh network. as in other networks like manet, adhoc, sensor power is the major constrained. but it is not so ... | a novel channel assignment algorithm for multicast in multi-radio wireless mesh networks | with the development of internet, many new applications with obvious multicast character come forth and become popular, which increase the importance of multicast in internet especially in wireless access networks where the bandwidths of networks are very limited. in this paper, we consider the problem of channel assig... | 215 |
line detection of parts using local uncertainty measure and local rht in noised images | the integration of local uncertainty measure with local randomized hough transform (rht) is proposed for line detection in the paper to tackle the problems of decrease in detection accuracy in noised images for line detection of complicated parts. the proposed scheme firstly partitions a machine-part into several regio... | an improved hough transform technique based on error propagation | this paper describes a bayesian scheme for incrementing the hough transform (nt) accumulator to improve the performance of the ht, making it more robust to noise. the proposed technique analytically computes the uncertainty of each feature point based on its gradient and location in the image. using the estimated uncer... | 216 |
a novel merging method in watershed segmentation. | the watershed transformation is the primary tool of mathematical morphology for image segmentation. however, the resulting image often appears oversegmented into a large number of tiny regions (basins), most of which are not significant in the problem of domain. in this paper, a method for removing non significant basi... | image analysis using mathematical morphology | for the purposes of object or defect identification required in industrial vision applications, the operations of mathematical morphology are more useful than the convolution operations employed in signal processing because the morphological operators relate directly to shape. the tutorial provided in this paper review... | 217 |
finite state machine optimization algorithms for pipelined data path controllers | algorithms for generating an optimal finite state machine (fsm) implementation of pipelined data path controllers are presented. the groups of states are partitioned into two, states are encoded, and each partition is mapped onto one pla to form a two-pla based moore-style fsm state sequencer. the experimental results ... | power and area reduction of md5 based on cryptoprocessor using novel approach of internal counters on the finite state machine | this work presents the design of a very simple microprocessor dedicated to cryptographic operations implementing message digest algorithm 5 (md5). we tested two control types based on the moore finite state machine: with and without registers as counters. the design was performed with synopsys tcad using an open source... | 218 |
multi-path equalization for ntsc video by using digital iir filter | the multipath channel is modeled as an analog linear system with a response of complex weighted impulses of various relative delays. the effect of radio-frequency-to-baseband conversion is included. the minimum mean square error criterion is used to find a digital fir approximation of the analog channel. the digital ii... | direct method for converting fir filter with low nonzero tap into iir filter | caliper brake apparatus has a caliper housing, an actuator including a plunger movable axially longitudinally to urge a lining against a rotating disc, and the lining having the form of a plate which is laterally elongated and defines a plane generally perpendicular to said axis. the apparatus is improved by: (a) the p... | 219 |
using ontologies to improve knowledge management in technology transfer | the management of knowledge is a significant issue for successful technology transfer. techniques and tools for knowledge management are becoming sufficiently mature and can be exploited to improve the process of technology transfer. an ontology is a knowledge base that has proven to be especially useful for capturing ... | semantic based query optimization using ontology for knowledge management | today's environment, web contributes greatly to the creation of an ever-increasing global information database. web is a collection of billions of web pages. web 2.0 is purely based on keyword based searching. because of using keyword based search engine, people may get relevant or irrelevant information. the amount of... | 220 |
a novel error-correcting codec for m-ary orthogonal modulations | a new and novel codec (coder-decoder) combining trellis coding with an m-ary orthogonal modulation is presented for application in wideband channels. the codec provides satisfactory bit error rates at lower transmitted signal power levels. current popular coding schemes which combine coding and modulation, such as trel... | performance of trellis coded modulation with 8psk through tdrss | the need to increase data-rate capabilities of the tracking and data relay satellite system (tdrss) has prompted nasa to investigate bandwidth-efficient modulation schemes. based upon current technology the most promising scheme is trellis-coded modulation (tcm) operating with octal phase shift keying (8 psk). in conju... | 221 |
synthesis of hazard-free multi-level logic under multiple-input changes from binary decision diagrams | we describe a new method for directly synthesizing a hazard-free multilevel logic implementation from a given logic specification. the method is based on free/ordered binary decision diagrams (bdd's), and is naturally applicable to multiple-output logic functions. given an incompletely-specified (multiple-output) boole... | sibling-substitution-based bdd minimization using don ’ t cares | in many computer-aided design tools, binary decision diagrams (bdds) are used to represent boolean functions. to increase the efficiency and capability of these tools, many algorithms have been developed to reduce the size of the bdds. this paper presents heuristic algorithms to minimize the size of the bdds representi... | 222 |
group scribbles-supported collaborative learning in a primary grade 5 science class | this chapter describes the setting and context of a group of primary grade 5 (about age 11) students doing a collaborative learning activity in a science class. data from this setting are analyzed in subsequent chapters in this book section. students, in groups of four, used a networked technology called group scribble... | using an intelligent tutoring system to support collaborative as well as individual learning | collaborative learning has been shown to be beneficial for older students, but there has not been much research to show if these results transfer to elementary school students. in addition, collaborative and individual modes of instruction may be better for acquiring different types of knowledge. collaborative intellig... | 223 |
a new codebook design scheme for fast beam searching in millimeter-wave communications | to overcome imperfection of exhaustive based beam searching scheme in ieee 802.15.3c and ieee 802.11ad and accelerate the beam training process, combined with the fast beam searching algorithm previously proposed, this paper proposed a beam codebook design scheme for phased array to not only satisfy the fast beam searc... | impulse response model and parameters for indoor channel modeling at 60ghz | in order to realize very high throughput wireless local area network (wlan) systems, which demand multi gbps capacities/bitrates, the ieee802.11.tgad (next generation wlan standard at 60ghz band) is in the standardization process. to evaluate and select the proposed physical layer modulation and coding schemes in the s... | 224 |
beyond failure: potentially mitigating failed author searches in the online library catalog through the use of linked data | linked data stores house vetted content that can supplement the information available through online library catalogs, potentially mitigating failed author searches if information about the author exists in linked data formats. in this case study, a total of 689 failed author index queries from a large midwestern acade... | “i cannot tell what the dickens his name is”: name disambiguation in institutional repositories | © 2014 walker & armstrong. this open access article is distributed under a creative commons attribution 4.0 unported license, which allows unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. | 225 |
selecting evolutionary operators using reinforcement learning: initial explorations | in evolutionary optimization, it is important to use efficient evolutionary operators, such as mutation and crossover. but it is often difficult to decide, which operator should be used when solving a specific optimization problem. so an automatic approach is needed. we propose an adaptive method of selecting evolution... | controlling genetic algorithms with reinforcement learning | here we present a hybrid system that uses a reinforcement learning agent to improve the performance of a genetic algorithm on the travelling salesman problem (tsp). the agent uses q(λ) learning to estimate state-action utility values, which it uses to implement high-level adaptive control over the genetic algorithm. in... | 226 |
generalizing focus+context visualization | focus+context visualization is well-known from information visualization: certain data subsets of special interest are shown in more detail (locally enlarged) whereas the rest of the data is provided as context (in reduced space) to support user orientation and navigation. the key point of this work is a generalized de... | techniques for non-linear magnification transformations | this paper presents efficient methods for implementing general non-linear magnification transformations. techniques are provided for: combining linear and non-linear magnifications, constraining the domain of magnifications, combining multiple transformations, and smoothly interpolating between magnified and normal vie... | 227 |
a real-time head nod and shake detector | head nods and head shakes are non-verbal gestures used often to communicate intent, emotion and to perform conversational functions. we describe a vision-based system that detects head nods and head shakes in real time and can act as a useful and basic interface to a machine. we use an infrared sensitive camera equippe... | affective learning – a manifesto | the use of the computer as a model, metaphor, and modelling tool has tended to privilege the ‘cognitive’ over the ‘affective’ by engendering theories in which thinking and learning are viewed as information processing and affect is ignored or marginalised. in the last decade there has been an accelerated flow of findin... | 228 |
a distributed software runtime environment to support testbed experimentation using adl/ads | adl/ads is a testbed user interface tool for experimentation with critical research and design issues associated with distributed processing. one significant class of problems well-suited for investigation in a testbed are data engineering concepts. adl/ads provides a graphics interface for expressing a candidate distr... | the pms and isp descriptive systems for computer structures | in this paper we propose two notations for describing aspects of computer systems that currently are handled by a melange of informal notations. these two notations emerged as a by-product of our efforts to produce a book on computer structures (bell and newell, 1970). since we feel it is slightly unusual to present no... | 229 |
deriving aoc c-models from d&v languages for single- or multi-threaded execution using c or c++ | the c language is getting more and more popular as a design and verification language (dvl). systemc, parc [1] and cx [2] are based on c. c-models of the design and verification environment can also be generated from new dvls (e.g. chisel [3]) or classical dvls such as vhdl or verilog. the execution of these models is ... | an aspect and transaction oriented programming, design and verification language (pdvl) | this paper proposes a novel aspect and transaction oriented programming, design and verification language (pdvl). the electronic system level (esl) language is inspired by systemverilog, systemc and many others, but adds for example program paradigms such as aspect and transaction oriented programming. to name a few im... | 230 |
context and planning for dynamic adaptation in pais | the need for constant adaptation to address emerging demands or undesired events within organizations has grown. unplanned situations may occur at any time during process execution and the design of a process model that predicts all paths should give place to flexible “organic” design. this paper addresses the problem ... | real-time process adaptation: a context-aware replanning approach | complexity and dynamism of day-to-day activities are inextricably linked, thus the need for constant adaptation to address emerging demands has grown. process adaptation is the action of customizing a process instance to make it applicable to a particular situation. however, unplanned conditions may occur at any time d... | 231 |
teaching semaphores using... semaphores | the word "semaphore" describes both a structure used in computing to manage concurrency and a signal used by trains and naval vessels to transmit information and prevent collisions. in this paper, we present a series of activities which help students build intuition about concurrency by managing "railway semaphores" us... | programming in game space: how to represent parallel programming concepts in an educational game | concurrent and parallel programming (cpp) skills are increasingly important in today's world of parallel hardware. however, the conceptual leap from deterministic sequential programming to cpp is notoriously challenging to make. our educational game parallel is designed to support the learning of cpp core concepts thro... | 232 |
performance on adaptive cooperative communications networks | in future communications, cooperative communication with relay networks will be the one of the most effective scheme to enlarge coverage area and to boost data rate. in the recent research results, the path selection, power allocation and relay protocols on relay networks are the most important factors to improve the s... | space-time diversity enhancements using collaborative communications | the use of the spatial dimension is known to greatly increase the reliability of quasi-static (i.e., nonergodic) wireless channels. in this paper, it is demonstrated that most of this gain can also be achieved through collaborative communications with single-antenna/multiple-antenna nodes when there is one receiving ag... | 233 |
single-path traffic-engineering with explicit routes in a flat differentiated services network | in this paper, we present a scalable algorithm, capable of finding a single-path traffic-engineered solution for routing traffic in a differentiated services network by means of explicit paths. additional supported features are preemption, fast restoration, with a choice of protection scheme, oversubscription and resou... | implications of interdomain traffic characteristics on traffic engineering | we study the interdomain traffic as seen by a non-transit isp, based on a six days trace covering all the interdomain links of this isp. our analysis considers the relationships between the interdomain traffic and the interdomain topology. we first discuss the day-to-day stability of the interdomain traffic matrix to e... | 234 |
fast speaker adaptation in automatic online subtitling | this paper deals with speaker adaptation techniques well suited for the task of online subtitling. two methods are briefly discussed, namely map adaptation and fmllr. the main emphasis is laid on the description of improvements involved in the process of adaptation subject to the time requirements. since the adaptation... | refinement approach for adaptation based on combination of map and fmllr | this paper deals with a combination of basic adaptation techniques of hidden markov model used in the speech recognition. the adaptation methods approach the data only through their statistics, which have to be accumulated before the adaptation process. when performing two adaptations subsequently, the data statistics ... | 235 |
a high-performance face detection system using openmp | we present the development of a novel high-performance face detection system using a neural network-based classification algorithm and an efficient parallelization with openmp. we discuss the design of the system in detail along with experimental assessment. our parallelization strategy starts with one level of threads... | nested parallelism in the ompi openmp/c compiler | this paper presents a new version of the ompi openmp c compiler, enhanced by lightweight runtime support based on user-level multithreading. a large number of threads can be spawned for a parallel region and multiple levels of parallelism are supported efficiently, without introducing additional overheads to the openmp... | 236 |
priority inversion handling in microkernel-based real-time mike | we propose a resource management model to avoid priority inversion problem that may occur when two tasks attempt to send service requests to a server task, and then the server task sends a request to another server task in a nested fashion. in this model we introduce two new concepts: job identifier inheritance and pri... | priority inheritance protocols: an approach to real-time synchronization | an investigation is conducted of two protocols belonging to the priority inheritance protocols class; the two are called the basic priority inheritance protocol and the priority ceiling protocol. both protocols solve the uncontrolled priority inversion problem. the priority ceiling protocol solves this uncontrolled pri... | 237 |
the xml twig approximate query approach based on query fragment relaxation | to deal with the problem of approximate query against xml documents,based on the query fragment relaxation,this paper proposes a xml twig approximate querying approach.the approach leverages the query history to speculate the user preferences,which is used to assign the importance for each query fragment of the given t... | result ranking of xml keyword query over xml document | in the realm of keyword-based xml retrieval with multiple results, we present a xml semantic weight-value structural model which can speculate the relationship of the keywords and the slca nodes based on the characteristic of xml documents and the structural relationship of slca. this model calculates the discriminatin... | 238 |
portable waveform development for software defined radios | this work focuses on the question: "how can we build waveforms that can be moved from one platform to another?'' therefore an approach based on the model driven architecture was evaluated. furthermore, a proof of concept is given with the port of a tetra waveform from a usrp platform to an sff sdr platform. | model-based waveform design for the universal software radio peripheral with simulink | waveform development is an important topic of the software defined radio (sdr) technology. to achieve the objectives of sdr, waveforms have to be efficient and portable to various platforms. | 239 |
multi-object qos routing algorithm based on dijkstra strategy | formalized analyzing the topology of network and the target of qos routing, this paper proposes the math model of qos routing. after giving the integrated estimated merit of qos routing, we present a dijkstra+ qos routing algorithm (dqra) based on dijkstra strategy. simulation results demonstrate that the dqra algorith... | a real-time and energy aware qos routing protocol for multimedia wireless sensor networks | image and video sensing data in the multimedia wireless sensor networks make many requirements in the resource of bandwidth and energy. for the purpose of real-time transmission of multimedia data, this paper proposes a new qos protocol applied to multimedia wireless sensor networks rear. in this protocol metadata is u... | 240 |
background extraction of color video based on the frame-difference | based on the frame-difference of color video stream during a time interval,we can extract the real-time background image of the video with moving objects in it.by using comprehensive means of red,green and blue components,this paper conducts a more in-depth algorithm to real-time extraction of image background problem ... | high points recognition method of scraped surface based on background subtraction | using computer vision library opencv, a method of automatic recognition high points of scraped workpiece surface is presented. the image is dealt with by background subtraction, median filtering, morphological processing, image negates, contour finding and drawing contours. in order to accurately and efficiently recogn... | 241 |
image quality assessment for dibr synthesized views using elastic metric | frames of free viewpoint video (fvv) synthesized with depth image-based rendering (dibr) mainly contains special local artifacts like geometric distortions, in which the shape of objects may be stretched/bent. human observers tend to perceive such local severe deformations instead of consistent shifting artifacts that ... | dibr synthesized image quality assessment based on morphological wavelets | most of the depth image based rendering (dibr) techniques produce synthesized images which contain nonuniform geometric distortions affecting edges coherency. this type of distortions are challenging for common image quality metrics. morphological filters maintain important geometric information such as edges across di... | 242 |
oblique projection based receiver with interference cancellation in ofdma uplink | this paper presents an oblique projection-based detection scheme with the assistance of parallel/successive interference cancellation (pic/sic) in the uplink of interleaved orthogonal frequency division multiple access (ofdma) systems. for every transmitted symbol, pic is first invoked to remove the multiple user inter... | soft information assisted space-time multiuser detection for highly loaded cdma | this letter presents an effective space-time multiuser detector (mud) with the assistance of soft information in multipath code division multiple access (cdma) channels. the space-time mud considered is a simple, separable spatial-temporal filter which consists of a single spatial filter and a single temporal filter. b... | 243 |
semiglobal robust regulation of nonlinear systems | this paper describes a recent approach to the problem of output regulation of nonlinear systems, which unifies and extends a number of earlier results on the subject. in particular the approach in question yields necessary and sufficient conditions for local structurally stable regulation and, for special classes of no... | semiglobal stabilization via measurement feedback for systems in triangular form | we consider the problem of semiglobally stabilizing a wide class of uncertain nonlinear system, which is made up of a linear nominal system affected by model uncertainties or nonlinearities. our approach is based on h/sub /spl infin// control tools and recovers existing results on the semiglobal stabilization via outpu... | 244 |
from acme to corba: bridging the gap | software architecture and middleware platforms are different abstraction levels of component-based development that have been evolved separately. in order to address the gap between these two areas, in this paper we discuss the integration of a generic and extensible architecture description language, acme, with a stan... | integrating software architecture concepts into the mda platform with uml profile | architecture description languages (adls) provide an abstract representation of software systems. achieving a concrete mapping of such representation into the implementation is one of the principal aspects of mda (model driven architecture). integration of adls within mda confers to the mda platform a higher level of a... | 245 |
estimating the center of gravity of an object using tilting by multiple mobile robots | in transporting various objects by multiple mobile robots we need to change the formation of robots and posture of an object. this planning depends on the mass and center of gravity of an object. here we discuss the accuracy of the estimation of the mass and the position of the center of gravity of an object. particula... | let us work together-task planning of multiple mobile robots | this paper surveys former studies on task planning of multiple mobile robots. task planning algorithms are categorized into four from two issues: dimensions of tasks demands (point-reaching tasks and region-sweeping tasks), and the number of iteration of the task (one-time tasks and iterative tasks). individual studies... | 246 |
trickle++: a context-aware trickle algorithm | we propose to augment the trickle algorithm with contextual information freely and locally available in low-power wireless networking technologies. the aim is to equip trickle with hints and heuristics allowing it to propagate updates faster using link indicators such as received signal strength and link quality indica... | adaptive approaches to relieving broadcast storms in a wireless multihop mobile ad hoc network | in a multihop mobile ad hoc network, broadcasting is an elementary operation to support many applications. previously, it is shown that naively broadcasting by flooding may cause serious redundancy, contention, and collision in the network, which we refer to as the broadcast storm problem. several threshold-based schem... | 247 |
circuit-sharing design between fft and imdct with pipeline structure for dab receiver | in this paper, a "circuit-sharing scheme" is proposed to design a reduced chipset for dab (digital audio broadcasting) receiver, involved the fast fourier transform (fft) circuit in the orthogonal frequency division multiplexing (ofdm) and imdct (inverse modified discrete cosine transform) synthesis filter in the audio... | fast subband filtering in mpeg audio coding | subband filtering is one of the most compute-intensive operations in the mpeg audio coding standard. the author proves that the matrixing operations in mpeg subband filtering can be efficiently computed using fast 32-point dct or inverse dct (idct) algorithms. > | 248 |
reader-aware multi-document summarization: an enhanced model and the first dataset | we investigate the problem of reader-aware multi-document summarization (ra-mds) and introduce a new dataset for this problem. to tackle ra-mds, we extend a variational auto-encodes (vaes) based mds framework by jointly considering news documents and reader comments. to conduct evaluation for summarization performance,... | centroid-based summarization of multiple documents: sentence extraction, utility-based evaluation, and user studies | we present a multi-document summarizer, called mead, which generates summaries using cluster centroids produced by a topic detection and tracking system. we also describe two new techniques, based on sentence utility and subsumption, which we have applied to the evaluation of both single and multiple document summaries... | 249 |
on the complexity of non-projective data-driven dependency parsing | in this paper we investigate several non-projective parsing algorithms for dependency parsing, providing novel polynomial time solutions under the assumption that each dependency decision is independent of all the others, called here the edge-factored model. we also investigate algorithms for non-projective parsing tha... | global transition-based non-projective dependency parsing | shi, huang, and lee (2017) obtained state-of-the-art results for english and chinese dependency parsing by combining dynamic-programming implementations of transition-based dependency parsers with a minimal set of bidirectional lstm features. however, their results were limited to projective parsing. in this paper, we ... | 250 |
semantic integration in learning from text. | we define learning as the generation of meaningful knowledge representations which can be utilized in future decision making. optimal learning entails that these knowledge representations be integrated with prior knowledge. in this paper, we introduce a knowledge representation based on an integration of a variety of s... | using predicate-argument structures for information extraction | in this paper we present a novel, customizable ie paradigm that takes advantage of predicate-argument structures. we also introduce a new way of automatically identifying predicate argument structures, which is central to our ie paradigm. it is based on: (1) an extended set of features; and (2) inductive decision tree ... | 251 |
quantitative evaluation of discrete event systems: models, performances and techniques | assuming that with the increasing complexity of new architectures, modeling and performance evaluation of discrete event systems are more and more necessary, the authors present some general remarks on the modeling concept. queuing networks, whose theory has been stimulated by needs in the computing field, are presente... | performance evaluation of asynchronous concurrent systems using petri nets | some analysis techniques for real-time asynchronous concurrent systems are presented. in order to model clearly the synchronization involved in these systems, an extended timed petri net model is used. the system to be studied is first modeled by a petri net. based on the petri net model, a system is classified into ei... | 252 |
a four quadrant analog multiplier based on a novel cmos linear current divider | an analog, gilbert-like cmos multiplier, based on a novel linear current divider, is described. the divider uses a cascade of two differential pairs to produce a linear dependence between the tail current and the two output currents. a numerical algorithm has been implemented to find the optimum sizing of the active de... | design of an error detector circuit for bpsk costas loop for carrier synchronization in millimeter-wave receivers | this paper presents the system requirements for the implementation of an error detector in costas loops for carrier synchronization in millimeter-wave receivers. when the inputs to a circuit are baseband signals, there is a need for dc coupling, four-quadrant operation and linear processing on the signals. based on the... | 253 |
curtailing latency in data center network by adopting jumbo frames | nowadays data centers are attracting a huge attention of researchers. the performance of the data centers is key to hold the successes of cloud computing. as dimensions of cloud computing are enhanced by offering multiple services, the responsibility of service provider escalates many folds. even hosting single service... | jumbo frames or not: that is the question! | we focus on a simple question in this paper: should data center network operators turn on ethernet jumbo frames? while prior work supports using jumbo frames for their throughput and cpu benefits, it is not clear whether these results are directly applicable to data center networks, particularly since they were perform... | 254 |
light-assisted a* path planning | this paper introduces a novel variant of the a^@? path planning algorithm, which we call light-assisted a^@? (or la^@? for short). the la^@? algorithm expands less nodes than a^@? during the search process, especially in scenarios where there are complex-shaped obstacles in the path between the start and goal nodes. th... | fuzzy-enhanced path-finding algorithm for agv roadmaps | path-finding algorithms (pfa) are successfully used to find the optimal path between two locations. good results are obtained if they are used in scenarios where the entire environment can be described mathematically. production environments of automated guided vehicles (agvs) are not one of those. pfa find solutions t... | 255 |
programming abstractions for dynamically partitioning and coordinating localized scientific calculations running on multiprocessors | certain software abstractions help to automate load balancing during various math-physics calculations on a team of concurrently executing processors. these abstractions have been tested on a vortex method for computational fluid dynamics. experiments exhibited good parallel speedups of 24 and 3.6,respectively, on 32 p... | software support for irregular and loosely synchronous problems | abstract a large class of scientific and engineering applications may be classified as irregular and loosely synchronous from the perspective of parallel processing. we present a partial classification of such problems. this classification has motivated us to enhance fortran d to provide language support for irregular,... | 256 |
performance and routability improvements for routability-driven fpga routers | routing fpgas (verma, 1999) is a challenging problem because of the relative scarcity of routing resources represented in wires and connection points. this can lead either to slow implementations caused by long wiring paths that avoid congestion or a failure to route all signals (mcmurchie, 1995). this paper presents s... | congestion and track usage improvement of large fpgas using metro-on-fpga methodology | asynchronous serial transceivers have been recently used for data multiplexing in large on-chip systems to alleviate the routing congestion and improve the routability. fpgas have considerable potential for using the serial transmission but these links have not been exploited in fpgas yet. in this paper, we present a n... | 257 |
generation of large-scale maps of science and associated indicators. | over the past several years, techniques have been developed for clustering very large segments of the technical literature using sources such as thomson isi's science citation index. the primary objective of this work has been to develop indicators of potential impact at the paper level to enhance planning and evaluati... | visualizing science by citation mapping | science mapping is discussed in the general context of information visualization. attempts to construct maps of science using citation data are reviewed, focusing on the use of co-citation clusters. new work is reported on a dataset of about 36,000 documents using simplified methods for ordination, and nesting maps hie... | 258 |
low-complexity online synthesis for amidar processors | future chip technologies will change the way ::: we deal with hardware design. first of all, logic resources ::: will be available in vast amount. furthermore, engineering ::: specialized designs for particular applications will no longer be ::: the general approach as the nonrecurring expenses will grow ::: tremendous... | mapping applications onto reconfigurable kress arrays | this paper introduces a design space explorer for coarse-grained reconfigurable kressarray architectures – to enable the designer to find out the optimal kressarray architecture for a given application. this tool employs a mapper based on simulated annealing, and is highly configurable for a variety of different kressa... | 259 |
development and evaluation of audio-visual asr: a study on connected digit recognition | abstract : we present our findings from audio-visual speech recognition experiments for connected digit recognition in noisy environments. we derive hybrid (geometric- and appearance-based) visual lip features using a real-time lip tracking algorithm that we proposed previously. using a small single-speaker corpus mode... | fundamentals of speech recognition | with the arrival of the era of multimedia application,various new techniques have come into existence.the speech recognition technology is being widely used in real life.the paper simply introduces and analyzes the fundamentals of speech recognition,and use the speech recognition system of windows 7 to make readers fur... | 260 |
a new generic model for signal propagation in wi-fi and wimax environments | the ability to accurately predict radio propagation behavior for wireless communication systems, such as cellular mobile radio, is becoming crucial to system design. since site measurements are costly, propagation models have been developed as suitable, low-cost, and convenient alternative. in this paper, we will propo... | challenges in developing wifi wide coverage access for river information services on the danube river | in this paper the authors present the state of the art regarding wireless communications for river information services (ris), developed or in development on the danube river, taking also into account signal propagation issues. wifi technologies and equipment are investigated along with the technological challenges suc... | 261 |
artificial-noise-aided nonlinear secure transmission for mu-miso wiretap channel with quantized csit | we consider nonlinear transceiver design for downlink multiuser multi-antenna secure communications with an external multi-antenna eavesdropper. the multi-antenna transmitter simultaneously transmits confidential-message-bearing signals and artificial noise (an) using nonlinear tomlinson harashima precoding based on th... | tomlinson-harashima precoding design in mimo wiretap channels based on the mmse criterion | this paper investigates the tomlinson-harashima precoding (thp) design for secure communications in broadcast multiple-input multiple-output (mimo) systems in the presence of a passive eavesdropper. we focus on optimizing the nonlinear transceiver to guarantee a certain quality-of-service (qos) level for the intended r... | 262 |
streaming distribution of a live seminar: rudimentary knowledge for lsi design | we gave a weekly lecture 10 times in raw using ustream. the text, slides were uploaded in advance on our web site, and the students asked questions through twitter. we announced the lecture date and time by our mailing list, then more than 500 students registered and more than 150 students took the lecture in real time... | design of analog cmos integrated circuits | thank you for downloading design of analog cmos integrated circuits. maybe you have knowledge that, people have look hundreds times for their chosen books like this design of analog cmos integrated circuits, but end up in malicious downloads. rather than enjoying a good book with a cup of coffee in the afternoon, inste... | 263 |
pempi-from mpi standard to programming environment | the message passing interface (mpi), as an effort to unify message passing systems to achieve portability, defines a widely used standard for writing message passing programs. but mpi alone operates on a rather system-oriented level and does not provide higher abstractions that are mandatory when developing large scale... | early applications in the message-passing interface (mpi) | we describe a number of early efforts to make use of the message-passing interface mpi standard in appli cations, based on an informal survey conducted in may-june, 1994. rather than a definitive statement of all mpi developmental work, this paper addresses the initial successes, progress, and impressions that appli ca... | 264 |
a (de)composable theory of rhythm perception | a definition is given of expectancy of events projected into the future by a complex temporal sequence. the definition can be decomposed into basic expectancy components projected by each time interval implicit in the sequence. a preliminary formulation of these basic curves is proposed and the (de)composition method i... | musical interactions with a perceptual robotic percussionist | we present our approach for human-robot musical interaction using a perceptual and socially-oriented robotic percussionist. our robot, named haile, listens to live players, analyzes perceptual musical aspects in real-time, and uses the product of this analysis to playback in an acoustically rich manner, forming musical... | 265 |
a chosen message attack on iso/iec 9796-1 signature scheme | we introduce an attack against the iso/iec 9796-1 digital signature scheme using redundancy, taking advantage of the multiplicative property of the rsa and rabin cryptosystems. the forged signature of 1 message is obtained from the signature of 3 others for any public exponent v. for even v, the modulus is factored fro... | handbook of applied cryptography | from the publisher: ::: a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols; more than 200 tables and figures; more than 1,000 number... | 266 |
texture coordinate compression for 3-d mesh models using texture image rearrangement | previous works related to texture coordinate coding of the three-dimensional(3-d) mesh models employed the same predictor as the geometry coder. however, discontinuities in the texture coordinates cause unreasonable prediction. especially, discontinuities become more serious for the 3-d mesh model with a non-atlas text... | an entropy coding method for floating-point texture coordinates of 3d mesh | 3d mesh compression has been studies for compact storage and fast transmission of large 3d meshes for a variety of graphics applications. however, there is still much redundancy not well exploited by the previous works, e.g., the redundancy lying in the floating-point data texture coordinates. this paper investigates t... | 267 |
modelling and parameter estimation of a ship boiler | this paper deals with the identification and parameter estimation part of an adaptive control system for a ship boiler. the adaptive control system should be of such a form that it could be implemented on a minicomputer and easily adjusted to other ship boilers with similar characteristics. a nonlinear model of the pro... | passivity based control of drum boiler | in this paper, we propose a novel state space model for the drum boilers with natural recirculation. the states of this model are the total mass and energy inventories. the main advantage of the model is that it has an affine structure in control variables. a passivity based inventory controller is developed, which ens... | 268 |
a profiling tool for heterogeneous multi-core systems | profiling is a process of collecting relevant data about the execution of an application. this is done in order to reveal code bottlenecks, measure the performance, and give detailed information about source code function contents and call graphs of the examined application. in this paper we present one such profiling ... | gprof: a call graph execution profiler | we extended the unix® system's profiler by gathering arcs in the call graph of a program. here is it 20 years later and this profiler is still in daily use. why is that? it's not because there aren't well-known areas for improvement.large complex programs are composed of many small routines that implement abstractions ... | 269 |
mdac design for an 8-bit 40 ms/s pipelined adc in a 0.18μm cmos process | this paper presents an mdac (multiplying digital-to-analog converter) for a low power eight bit and 40- ms/s pipeline adc (analog-to-digital converter). the operational amplifier (op-amp) dedicated fir this type of converters is performed by using telescopic architecture that has the advantages of low power and less-ar... | comparative study of two cmos operational amplifiers for high performance pipelined adc | this paper explains the choices taken for the design of two full differential operational amplifiers (op-amps). these op-amps have been designed for a mdac (multiplying digital-to-.analog converter) stage of a pipelined adc (analog to digital converter). it shows also the solutions found to reach high gain, wide bandwi... | 270 |
toward a protected cloud against side channel attacks: a game-theoretic framework | in a side-channel collocation attack on a multitenant public cloud, an adversary seeks to leak sensitive information through launching malicious virtual machines (vms) that would collocate with the victim vm and bypass the isolation provided by the hypervisor. this paper presents a game-theoretic framework to study the... | memory deduplication as a threat to the guest os | memory deduplication shares same-content memory pages and reduces the consumption of physical memory. it is effective on environments that run many virtual machines with the same operating system. memory deduplication, however, is vulnerable to memory disclosure attacks, which reveal the existence of an application or ... | 271 |
low complexity intra video coding using transform domain prediction | in this paper, a new low complexity intra coding framework is presented. the proposed method is extremely computationally efficient as it uses intra prediction in the dct domain. to facilitate finding a good predictor, we propose to extend the number of neighouring blocks to be searched, based on a consideration of the... | low complexity video compression using moving edge detection based on dct coefficients | in this paper, we propose a new low complexity video compression method based on detecting blocks containing moving edges using only dct coefficients. the detection, whilst being very efficient, also allows efficient motion estimation by constraining the search process to moving macro-blocks only. the encoders psnr is ... | 272 |
position paper: crdts for large-scale incremental processing | we propose a new approach for building distributed large-scale applications such as a social network or a search engine. it is based on high-level, conflict-free abstract data types interconnected with a dataflow-style notification network. this approach allows to replicate objects widely, close to the edge of the netw... | crdts: consistency without concurrency control | a crdt is a data type whose operations commute when they are concurrent. replicas of a crdt eventually converge without any complex concurrency control. as an existence proof, we exhibit a non-trivial crdt: a shared edit buffer called treedoc. we outline the design, implementation and performance of treedoc. we discuss... | 273 |
ethical hacking and password cracking: a pattern for individualized security exercises | a design pattern provides a type of template or meta-template for solving design problems. this paper provides and discusses a pattern for creating individualized learning exercises. the domain of application is security education. the specific examples presented, that have been realized in practice in an educational s... | combining an e-commerce simulation with a cyber-survivor exercise | a cyber-survivor exercise is an learning experience whereby each team of students attempts to defend their computer network against attacks by security educators. one of the difficulties in creating a meaningful contest is in both scoring how well each team did and in creating an environment that requires business deci... | 274 |
analysis and implementation of the max-nlms adaptive filter | we provide an efficient implementation and a statistical analysis of the max-nlms adaptive filter. this adaptive filter only adjusts the coefficient associated with the data element that has the maximum absolute value in the filter memory at each iteration. our method for determining this maximum absolute data value re... | a learning method for system identification | a method for system identification is proposed which is based on the error-correcting training procedure in learning machines, and is referred to as "learning identification." this learning identification is nondisturbing, is applicable to cases where the input signal is random and nonstationary, and can be completed w... | 275 |
user centered technologies research institute | in this paper we describe the user centered technologies research institute at university of applied sciences vorarlberg. we illustrate the perspectives on hci efforts concerning analogous communication in multi-modal hci as well as our research and development services for enterprises in order to support user centered... | universal access in hci : inclusive design in the information society | universal access and design for all assistive technologies mobile and ubiquitious interaction adaptation and personalization access to information user diversity accessibility and usability applications and services non-visual interaction interaction devices, techniques and modalities design and evaluation tools. | 276 |
pricing decision and lead time setting in a duopoly semiconductor industry | pricing and lead time setting are two important decisions in semiconductor foundry industries. this research considers the competition of a duopoly market consisting of two make-to-order firms in semiconductor foundry industries and presents a model to determine the equilibrium price and lead time of these two competin... | time – the next source of competitive advantage | a captive panel fastener assembly comprising a stud having three splines substantially along its length, a retaining ring with inwardly extending tabs slidably riding within said splines and a plug press-fitted to a bore at the forward end of the stud. after insertion of the stud through a hole in a panel, to which the... | 277 |
the role of semantic processing in an automatic speech understanding system | we present the semantics component of a speech understanding and dialogue system that is developed at our institute. due to pronunciation variabilities and vagueness of the word recognition process, semantics in a speech understanding system has to resolve additional problems. its main task is not only to build up a re... | semantics in speech recognition and understanding: a survey | this survey paper aims at summarizing the state of the art of computational semantic methods in speech recognition and understanding research. a taxonomy classifying the approaches adopted in the literature is divided into six main categories: semantic networks, semantic grammars, caseframes, statistical, unification-b... | 278 |
defocus-based image segmentation | foreground and background features are focused (or defocused) differently in an image because corresponding objects are at different depths in the scene. this paper presents a novel approach for segmenting foreground and background in video images based on feature defocus. a modified defocus measurement that distinguis... | estimating defocus blur via rank of local patches | this paper addresses the problem of defocus map estimation from a single image. we present a fast yet effective approach to estimate the spatially varying amounts of defocus blur at edge locations, which is based on the maximum ranks of the corresponding local patches with different orientations in gradient domain. suc... | 279 |
adaptive manipulation of a hybrid mechanism mobile robot | this paper reports experimental and analytical results of a hybrid mechanism mobile robot (hmmr) designed for field and military applications. the hmmr presented in this paper constitutes the second generation of a mobile robot that combines locomotion with manipulation in a symmetric invertible platform. the experimen... | towards mobile manipulator safety standards | we present an overview of the current (as of spring, 2013) safety standards for industrial robots and automated guided vehicles (agvs). we also describe how they relate to the safety concerns of mobile manipulators (robot arms mounted on mobile bases) in modern manufacturing. provisions for the capabilities of mobile m... | 280 |
an improved working set selection method for svm decomposition method | the support vector machine learning problem is a convex quadratic programming problem. for large learning tasks with many training examples, the general quadratic programs quickly become intractable in their memory and time requirements. thus the decomposition method is essential for the support vector machine learning... | an improved decomposition algorithm for regression support vector machines | a new decomposition algorithm for training regression support vector machines (svm) is presented. the algorithm builds on the basic principles of decomposition proposed by osuna et. al., and addresses the issue of optimal working set selection. the new criteria for testing optimality of a working set are derived. based... | 281 |
datapath oriented codesign method of application specific dsps using retargetable compiler | proposes a "datapath oriented" codesign methodology, which uses datapath configurations and horizontal codes, instead of instruction set specifications as an interface between hardware and software. given an application program and a dsp datapath configuration, the control part of the dsp is synthesized and a horizonta... | symbolic modeling and evaluation of data paths | we present an automata model which concisely captures the constraints imposed by a data-path, such as bus hazards, register constraints, and control encoding limitations. a set of uniform base components for depicting general data-paths and techniques for systematic translation of such depictions into boolean functions... | 282 |
a fast adaptive layout algorithm for undirected graphs | we present a randomized adaptive layout algorithm for nicely drawing undirected graphs that is based on the spring-embedder paradigm and contains several new heuristics to improve the convergence, including local temperatures, gravitational forces and the detection of rotations and oscillations. the proposed algorithm ... | dynamic parameter spring modeling algorithm for graph drawing | this paper proposes a modified spring modeling algorithm for drawing undirected graphs, that is an extension of the forceddirected placement method of spring modeling algorithm by eades. we call it dynamic parameter spring modeling algorithm. this algorithm is not only a general algorithm for graph layout, but also it ... | 283 |
information service model with mobile agent supported | mobile agent is a kind of novel agent technology characterized by mobile, intelligent, parallel and asynchronous computing. in this paper, a new information service model that adopts mobile agent technology is introduced first, and then an experimental system doltria system that is implemented based on the model is des... | market-based resource control for mobile agents | mobile agents are programs that can migrate from machine to machine in a heterogeneous network. as mobile agents move across a network,they consume resources. not only is there the additional congestion incurred through normal mobile agent use,but there are additional risks from denial-of-service attacks and other irre... | 284 |
time space sharing scheduling: a simulation analysis | we explain a new job scheduling class, called “time space sharing scheduling” (tsss) for partitionable parallel machines. tsss is a combination of time-sharing and space-sharing job scheduling techniques. our proposed “distributed queue tree” (dqt) is an instance of tsss. we evaluate and analyze dqt behavior in more de... | overhead analysis of preemptive gang scheduling | a preemptive gang scheduler is developed and evaluated. the gang scheduler, called score-d, is implemented on top of a unix operating system and runs on workstation and pc clusters connected by myrinet, a giga-bit class, high-performance network. | 285 |
property-oriented testing of real-time systems | although statecharts has gained widespread use as a formalism for modeling reactive real-time systems, testing these systems still confronts some difficulties, of which a major one is the existence of numerous and complex system behaviors. it is extremely difficult to conduct comprehensive and in-depth testing of such ... | generating test cases for real-time systems based on symbolic models | the state space explosion problem is one of the challenges to be faced by test case generation techniques, particularly when data values need to be enumerated. this problem gets even worse for real-time systems (rts) that also have time constraints. the usual solution in this context, based on finite state machines or ... | 286 |
switch++: an output device of the switches by the finger gestures | regarding human-machine-interfaces, switches have not changed significantly despite the machines themselves evolving constantly. in this paper, we propose a new method of operability for devices by providing multiple switches dynamically, and users choose the switch that has the functionality that they want to use. swi... | haptic chameleon: a new concept of shape-changing user interface controls with force feedback | in this paper, we introduce the concept of shape-changing, user interface control devices called "haptic chameleon", which refers to computer-controlled user interface devices that convey information to and from the user by altering their shape and feel. the user decides what a haptic chameleon control will do by chang... | 287 |
object based grid architecture for enhancing security in grid computing | this paper describes a simple logical method to enhance the security in the grid computing. object based grid architecture (oga) is a grid architecture based on object oriented concept to enhance the security in grid computing. in the grid environment the data and the process will be a public one since the job is execu... | the anatomy of the grid - enabling scalable virtual organizations | the term "the grid" was coined in the mid-1990s to denote a proposed distributed computing infrastructure for advanced science and engineering [4]. considerable progress has since been made on the construction of such an infrastructure (e.g., [1,6,7]) but the term "grid" has also been conflated, at least in popular per... | 288 |
use of chaotic sequences in a biologically inspired algorithm for engineering design optimization | recent computational developments in ant colony systems have proved fruitful for transforming discrete domains of application into continuous ones. in this paper, new combinations of an ant colony inspired algorithm (aca) and chaotic sequences (ach) are employed in well-studied continuous optimization problems of engin... | good lattice swarm algorithm for constrained engineering design optimization | engineering optimization in the intelligence swarm remains to be a challenge. recently, a novel optimization method based on number-theory and particle swarm, good lattice swarm optimization algorithm (glso), is introduced, which intends to produce faster and better global search ability and more accurate convergence b... | 289 |
froth image segmentation based on adaptive ray cluster | there are a number of noise areas, blur and adhesive froths in flotation image, with which classical watershed has no corresponding mechanism to cope. the paper proposes a segmentation algorithm of adaptive ray cluster, seed region are extracted by visiting every pixel just once and then noise areas are removed out. ra... | texture feature clustering and segmentation algorithm based on pixel | as the coverage area of the sub-block is too large, the texture feature clustering based on sub-block often produces the mosaic phenomenon of inaccurate boundary. in this paper, the texture clustering algorithm based on pixel extracts the texture feature vector of its central pixel point from sub-block. the image textu... | 290 |
study of cordic algorithm based on fpga | the coordinate rotational digital computer(cordic)algorithm can transform the complicated mathematical function into simple operation of add and shift, therefore it is widely used in hardware realization of digital signal process(dsp) algorithm. the pipelined operational circuit of cosine and sine functions based on co... | real-time s-scan imaging reconstruction for ultrasonic phase array based on cordic and sectorial interpolation algorithms | in the sectorial scan (s-scan) view of the ultrasound phase array system, the echo data produced from the ultrasonic sensors usually are acquired in the polar coordinates, but need to be displayed in the cartesian coordinates, which can then realize image reconstruction with pixel filling technology. to effectively per... | 291 |
parking slot identification using local binary pattern and support vector machine | parking space availability has become common problem in many big cities. this problem occurs due to fast growing of vehicle ownership. therefore, the demand of parking area in big cities is also increased. an information system on parking space availability may help the driver to find accurately the parking location. t... | a method of parking space detection based on image segmentation and lbp | this paper proposes a novel parking spaces detection algorithm which is based on image segmentation and local binary pattern. the vehicles are usually contains a lot of compositions, while the vacant parking spaces' composition is relatively small. according to this characteristic, we segment the parking image. to judg... | 292 |
smart design of similarity relations for fuzzy logic programming environments | similarity relations are used in several fuzzy logic programming environments like floper, which has been developed in our research group along the last decade. strongly connected with this system, in this paper we show how its auxiliary latticemakertool has been extended for aiding the graphical design of such structu... | fuzzy logic and the resolution principle | abstract the relationship between fuzzy logic and two-valued logic in the context of the first order predicate calculus is discussed. it is proved that if every clause in a set of clauses is something more than a “half-truth” and the most reliable clause has truth-value a and the most unreliable clause has truth-value ... | 293 |
igp link weight assignment for transient link failures | intra-domain routing in ip backbone networks relies on link-state protocols such as is-is or ospf. these protocols associate a weight (or cost) with each network link, and compute traffic routes based on these weight. however, proposed methods for selecting link weights largely ignore the issue of failures which arise ... | reconfiguration in multi class of services networks | this paper presents an optimisation method to traffic engineer networks carrying different classes of traffic. the novel mixed integer programming model is based on the classical multi-commodity flow problem. although some initial input data (such as topology and traffic matrix) is required, the method can be directly ... | 294 |
the role of constraints and discontinuities in visible-surface reconstruction. | nitrogen-heterocyclic phosphonic acids and derivatives thereof characterized by aminomethyl (or substituted methyl) phosphonic acids or derivatives thereof bonded directly or indirectly, i.e., through a n-side chain to the nitrogen atom in the heterocyclic ring, for example those containing in the molecule at least one... | geometrical modeling from multiple stereo views | the components of the sheffield artificial intelligence vision research unit (aivru) three-dimensional (3d) vision sys tem, which currently supports model-based object recognition and location, are described. its potential for robotics applica tions is demonstrated by its guidance of a universal machine intelligence ro... | 295 |
segmentation of isolated and touching characters in offline handwritten gurmukhi script recognition | segmentation of a word into characters is one of the important challenges in optical character recognition. this is even more challenging when we segment characters in an offline handwritten document. touching characters make this problem more complex. in this paper, we have applied water reservoir based technique for ... | devanagari handwritten text segmentation for overlapping and conjunct characters- a proficient technique | optical character recognition alludes to the methodology of taking images or photos of letters or typewritten content and changing over them into information that a machine can easily interpret, e.g. organizations and libraries taking physical duplicates of books, magazines, or other old printed material and utilizing ... | 296 |
high speed, low power n/ (n+1) prescalerusing tspc and e-tspc: a survey | one of the important functional blocks in frequency synthesizers is the high speed dual modulus prescaler. prescaler determines how fast the frequency synthesizer is. the bottleneck of the dual modulus prescaler design is that it operates at the highest frequencies and consumes more power than any other circuit blocks ... | a 1.6-ghz dual modulus prescaler using the extended true-single-phase-clock cmos circuit technique (e-tspc) | the implementation of a dual-modulus prescaler (divide by 128/129) using an extension of the true-single-phase-clock (tspc) technique, the extended tspc (e-tspc), is presented. the e-tspc consists of a set of composition rules for single-phase-clock circuits employing static, dynamic, latch, data-precharged, and nmos-l... | 297 |
curvature scale space corner detector with adaptive threshold and dynamic region of support | corners play an important role in object identification methods used in machine vision and image processing systems. single-scale feature detection finds it hard to detect both fine and coarse features at the same time. on the other hand, multi-scale feature detection is inherently able to solve this problem. this pape... | contextual models for automatic building extraction in high resolution remote sensing image using object-based boosting method | many traditional target extraction methods encountered new challenges as the spatial resolution is increasing quickly. for the purpose of extracting buildings in that circumstance, a new method combing both the object-based approach and boosting algorithm is proposed in this paper. the method associates segmentation wi... | 298 |
formal verification of object-oriented graph grammars specifications | concurrent object-oriented systems are ubiquitous due to the importance of networks and the current demands for modular, reusable, and easy to develop software. however, checking the correctness of such systems is a hard task, mainly due to concurrency and inheritance aspects. in this paper we present an approach to th... | explicit state model checking for graph grammars | in this paper we present the philosophy behind the groove project, in which graph transformation is used as a modelling formalism on top of which a model checking approach to software verification is being built. we describe the basic formalism, the current state of the project, and (current and future) challenges. | 299 |
vhf filtering with digital programmability and accumulation mos-c | in this paper we report a design strategy for vhf filtering in standard digital cmos processes. the design approach is based on fully-balanced pseudo-differential continuous-time transconductors for applications in low-voltage systems over the vhf range and implemented with mos-c accumulation capacitors. a 3rd-order gm... | a precision variable-supply cmos comparator | several new techniques are presented for the design of precision cmos voltage comparator circuits which operate over a wide range of supply voltages. since most monolithic a/d converter systems contain an on-chip voltage reference, techniques have been developed to replicate the reference voltage in order to provide st... | 300 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.