title_a
stringlengths
27
199
abstract_a
stringlengths
43
1.02k
title_b
stringlengths
30
199
abstract_b
stringlengths
39
1.02k
id
int64
1
186k
theoretical and practical analysis of the cockroach antenna
insects posses garden variety of traits, but for some which lack the ability of vision, their species would have been extinct long ago. through ingenuity of creation, these species adapted to the environment by developing antennas where they can use the principle of basic electromagnetics to feel the surrounding object...
microstrip antenna design handbook
thank you very much for downloading microstrip antenna design handbook. as you may know, people have search numerous times for their chosen books like this microstrip antenna design handbook, but end up in harmful downloads. rather than enjoying a good book with a cup of tea in the afternoon, instead they cope with som...
201
the kth-best approach for linear bilevel multi-follower programming
the majority of research on bilevel programming has centered on the linear version of the problem in which only one leader and one follower are involved. this paper addresses linear bilevel multi-follower programming (blmfp) problems in which there is no sharing information among followers. it explores the theoretical ...
a multiple objective programming approach to linear bilevel multi-follower programming
in this paper, we investigate the relationship between a certain class of linear bilevel multifollower programming problems and multiple objective programming. we introduce two multiple objective linear programming problems with different objective functions and the same constraint region. we show that the extreme poin...
202
gathering digital evidence in response to information security incidents
to effectively fight computer crime, it is necessay to locate criminal evidence, from within the computer and the network; this necessitates forensic enquiry so that the evidence will be secured in an appropriate manner, and will be acceptable in a court of law as proof of criminal behavior. digital evidence is data in...
measures of retaining digital evidence to prosecute computer-based cyber-crimes
with the rapid growth of computer and network systems in recent years, there has also been a corresponding increase in cyber-crime. cyber-crime takes many forms and has garnered much attention in the media, making information security a more urgent and important priority. in order to fight cyber-crime, criminal evidenc...
203
finding domain specific collocations and concordances on the web
terminoweb is a web-based platform designed to find and explore specialized domain knowledge on the web. an important aspect of this exploration is the discovery of domain-specific collocations on the web and their presentation in a concordancer to provide contextual information. such information is valuable to a trans...
webbootcat: instant domain-specific corpora to support human translators
we present a web service to aid translators by quickly ::: producing corpora for specialist areas, in any of a range of ::: languages, from the web. the underlying bootcat tools have ::: already been extensively used: here, we present a version which ::: is easy for non-technical people to use as all they need do is ::...
204
a compensation-based replenishment model for deteriorating items via simulated annealing method
in a competitive market environment, business seeks to reduce cost by using strategic integration. this study derives an inventory replenishment model for a two-echelon supply chain in which the retailer is a leader of product price and the supplier is a price-follower. we consider that market demand is affected by its...
inventory replenishment policy for a linear trend in demand—an analytical solution
the classical no-shortage inventory policy is examined for the case of a linear trend in demand. using methods of calculus a computationally simple procedure for determining the optimal times for replenishment of inventory is established. table extracts for the functions required are included.
205
three engines to solve verification constraints of decimal floating-point operation
decimal floating-point designs require a verification process to prove that the design is in compliance with the ieee standard for floating-point arithmetic (ieee std 754-2008). our work represents three engines, the first engine for the verification of decimal addition-subtraction operation, the second for the verific...
verification of the decimal floating-point square root operation
decimal floating-point is a relatively recent addition to the ieee standard (ieee std 754-2008). there exist few verification techniques that can check whether software libraries or hardware designs are in compliance with the standard. our work presents a verification method to verify implementations of the decimal flo...
206
detection of gene orthology based on protein-protein interaction networks
ortholog detection methods present a powerful approach for finding genes that participate in similar biological processes across different organisms, extending our understanding of interactions between genes across different pathways, and understanding the evolution of gene families. we exploit features derived from th...
authoritative sources in a hyperlinked environment
the network structure of a hyperlinked environment can be a rich source of information about the content of the environment, provided we have effective means for understanding it. we develop a set of algorithmic tools for extracting information from the link structures of such environments, and report on experiments th...
207
tweeting questions in academic conferences: seeking or promoting information?
the fast growth of social media has reshaped the traditional way of human interaction and information seeking behavior, which draws research attention on characterizing the new information seeking paradigm. however, results from previous studies might not be well grounded under certain social settings. in this paper, w...
question identification on twitter
in this paper, we investigate the novel problem of automatic question identification in the microblog environment. it contains two steps: detecting tweets that contain questions (we call them "interrogative tweets") and extracting the tweets which really seek information or ask for help (so called "qweets") from interr...
208
optimal relay selection algorithm for combining distance and social information in d2d cooperative communication networks
with the rapid growth of mobile data traffic demand, d2d relay technology is becoming an essential technology for the next generation mobile network. in order to select the optimal node in a shorter time, a cooperative d2d relay model considering the physical distance and social information is proposed. and then a thre...
compromised secrecy region with adaptive jamming for heterogeneous cellular networks and social relationship model
this work studies the security enhancement and social relationship model in heterogeneous d2d and cellular network with an adaptive jamming. different from traditional physical layer securities that optimize secrecy capacity, we investigate strategies based on reduction of compromised secrecy region (csr). specifically...
209
compact fuzzy models through complexity reduction and evolutionary optimization
genetic algorithms (gas) and other evolutionary optimization methods to design fuzzy rules from data for systems modeling and classification have received much attention in recent literature. we show that different tools for modeling and complexity reduction can be favorably combined in a scheme with ga-based parameter...
new criteria for rule selection in fuzzy learning classifier systems
designing an effective criterion for selecting the best rule is a major problem in the process of implementing fuzzy learning classifier (flc) systems. conventionally confidence and support or combined measures of these are used as criteria for fuzzy rule evaluation. in this paper new entities namely precision and reca...
210
design and implementation of logical topology in sensor network for an industrial stack monitoring
wireless sensor network (wsn) has gained worldwide attention in recent years. the design of a wsn depends significantly on the application. in sensor network design, physical and logical topology plays a major role. transfer information in real time means, to provide a required result in a bounded time. large-scale sen...
the design space of wireless sensor networks ∗
in the recent past, wireless sensor networks have found their way into a wide variety of applications and systems with vastly varying requirements and characteristics. as a consequence, it is becoming increasingly difficult to discuss typical requirements regarding hardware issues and software support. this is particul...
211
arena: the arena product family: enterprise modeling solutions
this paper introduces the arena suite of products for modeling, simulation, and optimization highlighting product architecture and technology features that are targeted toward successful deployment of simulation and arena throughout an enterprise.
interfacing simulation with costing software to drive the transformation from prototype manufacturing to high volume manufacturing
often companies are faced with the situation of "ramping-up" production of a new product. although this may seem like it should be a simple task, making the transition from a manufacturing environment that makes small volumes of some product well to an environment that must make large volumes well entails many decision...
212
detecting corner using fuzzy similarity matrix
in real-time video stream application, a feature point detector is very necessary. stable feature points are useful in machine vision application. feature point detectors such as sift, harris and susan are good methods which extracted high quality features, but neither the harris detector nor the detection stage of sif...
susan—a new approach to low level image processing
this paper describes a new approach to low level image processing; in particular, edge and corner detection and structure preserving noise reduction. ::: ::: non-linear filtering is used to define which parts of the image are closely related to each individual pixel; each pixel has associated with it a local image regi...
213
parallel http for video streaming in wireless networks
to stream video using http, a client device sequentiallyrequests and receives chunks of the video file fromthe server over a tcp connection. it is well-known that tcpperforms poorly in networks with high latency and packet losssuch as wireless networks. on mobile devices, in particular, usinga single tcp connection for...
improving tcp/ip performance over wireless networks
tcp is a reliable transport protocol tuned to perform well intraditional networks made up of links with low bit-error rates.networks with higher bit-error rates, such as those with wirelesslinks and mobile hosts, violate many of the assumptions made bytcp, causing degraded end-to-end performance. in tbis paper, wedescr...
214
load balancing based channel assignment in multicast wireless mesh network
wireless mesh network is an emerging technology for the next generation wireless internet. it works as a backhaul for other wireless network. there are number of issues which need to be considering in wireless mesh network. as in other networks like manet, adhoc, sensor power is the major constrained. but it is not so ...
a novel channel assignment algorithm for multicast in multi-radio wireless mesh networks
with the development of internet, many new applications with obvious multicast character come forth and become popular, which increase the importance of multicast in internet especially in wireless access networks where the bandwidths of networks are very limited. in this paper, we consider the problem of channel assig...
215
line detection of parts using local uncertainty measure and local rht in noised images
the integration of local uncertainty measure with local randomized hough transform (rht) is proposed for line detection in the paper to tackle the problems of decrease in detection accuracy in noised images for line detection of complicated parts. the proposed scheme firstly partitions a machine-part into several regio...
an improved hough transform technique based on error propagation
this paper describes a bayesian scheme for incrementing the hough transform (nt) accumulator to improve the performance of the ht, making it more robust to noise. the proposed technique analytically computes the uncertainty of each feature point based on its gradient and location in the image. using the estimated uncer...
216
a novel merging method in watershed segmentation.
the watershed transformation is the primary tool of mathematical morphology for image segmentation. however, the resulting image often appears oversegmented into a large number of tiny regions (basins), most of which are not significant in the problem of domain. in this paper, a method for removing non significant basi...
image analysis using mathematical morphology
for the purposes of object or defect identification required in industrial vision applications, the operations of mathematical morphology are more useful than the convolution operations employed in signal processing because the morphological operators relate directly to shape. the tutorial provided in this paper review...
217
finite state machine optimization algorithms for pipelined data path controllers
algorithms for generating an optimal finite state machine (fsm) implementation of pipelined data path controllers are presented. the groups of states are partitioned into two, states are encoded, and each partition is mapped onto one pla to form a two-pla based moore-style fsm state sequencer. the experimental results ...
power and area reduction of md5 based on cryptoprocessor using novel approach of internal counters on the finite state machine
this work presents the design of a very simple microprocessor dedicated to cryptographic operations implementing message digest algorithm 5 (md5). we tested two control types based on the moore finite state machine: with and without registers as counters. the design was performed with synopsys tcad using an open source...
218
multi-path equalization for ntsc video by using digital iir filter
the multipath channel is modeled as an analog linear system with a response of complex weighted impulses of various relative delays. the effect of radio-frequency-to-baseband conversion is included. the minimum mean square error criterion is used to find a digital fir approximation of the analog channel. the digital ii...
direct method for converting fir filter with low nonzero tap into iir filter
caliper brake apparatus has a caliper housing, an actuator including a plunger movable axially longitudinally to urge a lining against a rotating disc, and the lining having the form of a plate which is laterally elongated and defines a plane generally perpendicular to said axis. the apparatus is improved by: (a) the p...
219
using ontologies to improve knowledge management in technology transfer
the management of knowledge is a significant issue for successful technology transfer. techniques and tools for knowledge management are becoming sufficiently mature and can be exploited to improve the process of technology transfer. an ontology is a knowledge base that has proven to be especially useful for capturing ...
semantic based query optimization using ontology for knowledge management
today's environment, web contributes greatly to the creation of an ever-increasing global information database. web is a collection of billions of web pages. web 2.0 is purely based on keyword based searching. because of using keyword based search engine, people may get relevant or irrelevant information. the amount of...
220
a novel error-correcting codec for m-ary orthogonal modulations
a new and novel codec (coder-decoder) combining trellis coding with an m-ary orthogonal modulation is presented for application in wideband channels. the codec provides satisfactory bit error rates at lower transmitted signal power levels. current popular coding schemes which combine coding and modulation, such as trel...
performance of trellis coded modulation with 8psk through tdrss
the need to increase data-rate capabilities of the tracking and data relay satellite system (tdrss) has prompted nasa to investigate bandwidth-efficient modulation schemes. based upon current technology the most promising scheme is trellis-coded modulation (tcm) operating with octal phase shift keying (8 psk). in conju...
221
synthesis of hazard-free multi-level logic under multiple-input changes from binary decision diagrams
we describe a new method for directly synthesizing a hazard-free multilevel logic implementation from a given logic specification. the method is based on free/ordered binary decision diagrams (bdd's), and is naturally applicable to multiple-output logic functions. given an incompletely-specified (multiple-output) boole...
sibling-substitution-based bdd minimization using don ’ t cares
in many computer-aided design tools, binary decision diagrams (bdds) are used to represent boolean functions. to increase the efficiency and capability of these tools, many algorithms have been developed to reduce the size of the bdds. this paper presents heuristic algorithms to minimize the size of the bdds representi...
222
group scribbles-supported collaborative learning in a primary grade 5 science class
this chapter describes the setting and context of a group of primary grade 5 (about age 11) students doing a collaborative learning activity in a science class. data from this setting are analyzed in subsequent chapters in this book section. students, in groups of four, used a networked technology called group scribble...
using an intelligent tutoring system to support collaborative as well as individual learning
collaborative learning has been shown to be beneficial for older students, but there has not been much research to show if these results transfer to elementary school students. in addition, collaborative and individual modes of instruction may be better for acquiring different types of knowledge. collaborative intellig...
223
a new codebook design scheme for fast beam searching in millimeter-wave communications
to overcome imperfection of exhaustive based beam searching scheme in ieee 802.15.3c and ieee 802.11ad and accelerate the beam training process, combined with the fast beam searching algorithm previously proposed, this paper proposed a beam codebook design scheme for phased array to not only satisfy the fast beam searc...
impulse response model and parameters for indoor channel modeling at 60ghz
in order to realize very high throughput wireless local area network (wlan) systems, which demand multi gbps capacities/bitrates, the ieee802.11.tgad (next generation wlan standard at 60ghz band) is in the standardization process. to evaluate and select the proposed physical layer modulation and coding schemes in the s...
224
beyond failure: potentially mitigating failed author searches in the online library catalog through the use of linked data
linked data stores house vetted content that can supplement the information available through online library catalogs, potentially mitigating failed author searches if information about the author exists in linked data formats. in this case study, a total of 689 failed author index queries from a large midwestern acade...
“i cannot tell what the dickens his name is”: name disambiguation in institutional repositories
© 2014 walker & armstrong. this open access article is distributed under a creative commons attribution 4.0 unported license, which allows unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
225
selecting evolutionary operators using reinforcement learning: initial explorations
in evolutionary optimization, it is important to use efficient evolutionary operators, such as mutation and crossover. but it is often difficult to decide, which operator should be used when solving a specific optimization problem. so an automatic approach is needed. we propose an adaptive method of selecting evolution...
controlling genetic algorithms with reinforcement learning
here we present a hybrid system that uses a reinforcement learning agent to improve the performance of a genetic algorithm on the travelling salesman problem (tsp). the agent uses q(λ) learning to estimate state-action utility values, which it uses to implement high-level adaptive control over the genetic algorithm. in...
226
generalizing focus+context visualization
focus+context visualization is well-known from information visualization: certain data subsets of special interest are shown in more detail (locally enlarged) whereas the rest of the data is provided as context (in reduced space) to support user orientation and navigation. the key point of this work is a generalized de...
techniques for non-linear magnification transformations
this paper presents efficient methods for implementing general non-linear magnification transformations. techniques are provided for: combining linear and non-linear magnifications, constraining the domain of magnifications, combining multiple transformations, and smoothly interpolating between magnified and normal vie...
227
a real-time head nod and shake detector
head nods and head shakes are non-verbal gestures used often to communicate intent, emotion and to perform conversational functions. we describe a vision-based system that detects head nods and head shakes in real time and can act as a useful and basic interface to a machine. we use an infrared sensitive camera equippe...
affective learning – a manifesto
the use of the computer as a model, metaphor, and modelling tool has tended to privilege the ‘cognitive’ over the ‘affective’ by engendering theories in which thinking and learning are viewed as information processing and affect is ignored or marginalised. in the last decade there has been an accelerated flow of findin...
228
a distributed software runtime environment to support testbed experimentation using adl/ads
adl/ads is a testbed user interface tool for experimentation with critical research and design issues associated with distributed processing. one significant class of problems well-suited for investigation in a testbed are data engineering concepts. adl/ads provides a graphics interface for expressing a candidate distr...
the pms and isp descriptive systems for computer structures
in this paper we propose two notations for describing aspects of computer systems that currently are handled by a melange of informal notations. these two notations emerged as a by-product of our efforts to produce a book on computer structures (bell and newell, 1970). since we feel it is slightly unusual to present no...
229
deriving aoc c-models from d&v languages for single- or multi-threaded execution using c or c++
the c language is getting more and more popular as a design and verification language (dvl). systemc, parc [1] and cx [2] are based on c. c-models of the design and verification environment can also be generated from new dvls (e.g. chisel [3]) or classical dvls such as vhdl or verilog. the execution of these models is ...
an aspect and transaction oriented programming, design and verification language (pdvl)
this paper proposes a novel aspect and transaction oriented programming, design and verification language (pdvl). the electronic system level (esl) language is inspired by systemverilog, systemc and many others, but adds for example program paradigms such as aspect and transaction oriented programming. to name a few im...
230
context and planning for dynamic adaptation in pais
the need for constant adaptation to address emerging demands or undesired events within organizations has grown. unplanned situations may occur at any time during process execution and the design of a process model that predicts all paths should give place to flexible “organic” design. this paper addresses the problem ...
real-time process adaptation: a context-aware replanning approach
complexity and dynamism of day-to-day activities are inextricably linked, thus the need for constant adaptation to address emerging demands has grown. process adaptation is the action of customizing a process instance to make it applicable to a particular situation. however, unplanned conditions may occur at any time d...
231
teaching semaphores using... semaphores
the word "semaphore" describes both a structure used in computing to manage concurrency and a signal used by trains and naval vessels to transmit information and prevent collisions. in this paper, we present a series of activities which help students build intuition about concurrency by managing "railway semaphores" us...
programming in game space: how to represent parallel programming concepts in an educational game
concurrent and parallel programming (cpp) skills are increasingly important in today's world of parallel hardware. however, the conceptual leap from deterministic sequential programming to cpp is notoriously challenging to make. our educational game parallel is designed to support the learning of cpp core concepts thro...
232
performance on adaptive cooperative communications networks
in future communications, cooperative communication with relay networks will be the one of the most effective scheme to enlarge coverage area and to boost data rate. in the recent research results, the path selection, power allocation and relay protocols on relay networks are the most important factors to improve the s...
space-time diversity enhancements using collaborative communications
the use of the spatial dimension is known to greatly increase the reliability of quasi-static (i.e., nonergodic) wireless channels. in this paper, it is demonstrated that most of this gain can also be achieved through collaborative communications with single-antenna/multiple-antenna nodes when there is one receiving ag...
233
single-path traffic-engineering with explicit routes in a flat differentiated services network
in this paper, we present a scalable algorithm, capable of finding a single-path traffic-engineered solution for routing traffic in a differentiated services network by means of explicit paths. additional supported features are preemption, fast restoration, with a choice of protection scheme, oversubscription and resou...
implications of interdomain traffic characteristics on traffic engineering
we study the interdomain traffic as seen by a non-transit isp, based on a six days trace covering all the interdomain links of this isp. our analysis considers the relationships between the interdomain traffic and the interdomain topology. we first discuss the day-to-day stability of the interdomain traffic matrix to e...
234
fast speaker adaptation in automatic online subtitling
this paper deals with speaker adaptation techniques well suited for the task of online subtitling. two methods are briefly discussed, namely map adaptation and fmllr. the main emphasis is laid on the description of improvements involved in the process of adaptation subject to the time requirements. since the adaptation...
refinement approach for adaptation based on combination of map and fmllr
this paper deals with a combination of basic adaptation techniques of hidden markov model used in the speech recognition. the adaptation methods approach the data only through their statistics, which have to be accumulated before the adaptation process. when performing two adaptations subsequently, the data statistics ...
235
a high-performance face detection system using openmp
we present the development of a novel high-performance face detection system using a neural network-based classification algorithm and an efficient parallelization with openmp. we discuss the design of the system in detail along with experimental assessment. our parallelization strategy starts with one level of threads...
nested parallelism in the ompi openmp/c compiler
this paper presents a new version of the ompi openmp c compiler, enhanced by lightweight runtime support based on user-level multithreading. a large number of threads can be spawned for a parallel region and multiple levels of parallelism are supported efficiently, without introducing additional overheads to the openmp...
236
priority inversion handling in microkernel-based real-time mike
we propose a resource management model to avoid priority inversion problem that may occur when two tasks attempt to send service requests to a server task, and then the server task sends a request to another server task in a nested fashion. in this model we introduce two new concepts: job identifier inheritance and pri...
priority inheritance protocols: an approach to real-time synchronization
an investigation is conducted of two protocols belonging to the priority inheritance protocols class; the two are called the basic priority inheritance protocol and the priority ceiling protocol. both protocols solve the uncontrolled priority inversion problem. the priority ceiling protocol solves this uncontrolled pri...
237
the xml twig approximate query approach based on query fragment relaxation
to deal with the problem of approximate query against xml documents,based on the query fragment relaxation,this paper proposes a xml twig approximate querying approach.the approach leverages the query history to speculate the user preferences,which is used to assign the importance for each query fragment of the given t...
result ranking of xml keyword query over xml document
in the realm of keyword-based xml retrieval with multiple results, we present a xml semantic weight-value structural model which can speculate the relationship of the keywords and the slca nodes based on the characteristic of xml documents and the structural relationship of slca. this model calculates the discriminatin...
238
portable waveform development for software defined radios
this work focuses on the question: "how can we build waveforms that can be moved from one platform to another?'' therefore an approach based on the model driven architecture was evaluated. furthermore, a proof of concept is given with the port of a tetra waveform from a usrp platform to an sff sdr platform.
model-based waveform design for the universal software radio peripheral with simulink
waveform development is an important topic of the software defined radio (sdr) technology. to achieve the objectives of sdr, waveforms have to be efficient and portable to various platforms.
239
multi-object qos routing algorithm based on dijkstra strategy
formalized analyzing the topology of network and the target of qos routing, this paper proposes the math model of qos routing. after giving the integrated estimated merit of qos routing, we present a dijkstra+ qos routing algorithm (dqra) based on dijkstra strategy. simulation results demonstrate that the dqra algorith...
a real-time and energy aware qos routing protocol for multimedia wireless sensor networks
image and video sensing data in the multimedia wireless sensor networks make many requirements in the resource of bandwidth and energy. for the purpose of real-time transmission of multimedia data, this paper proposes a new qos protocol applied to multimedia wireless sensor networks rear. in this protocol metadata is u...
240
background extraction of color video based on the frame-difference
based on the frame-difference of color video stream during a time interval,we can extract the real-time background image of the video with moving objects in it.by using comprehensive means of red,green and blue components,this paper conducts a more in-depth algorithm to real-time extraction of image background problem ...
high points recognition method of scraped surface based on background subtraction
using computer vision library opencv, a method of automatic recognition high points of scraped workpiece surface is presented. the image is dealt with by background subtraction, median filtering, morphological processing, image negates, contour finding and drawing contours. in order to accurately and efficiently recogn...
241
image quality assessment for dibr synthesized views using elastic metric
frames of free viewpoint video (fvv) synthesized with depth image-based rendering (dibr) mainly contains special local artifacts like geometric distortions, in which the shape of objects may be stretched/bent. human observers tend to perceive such local severe deformations instead of consistent shifting artifacts that ...
dibr synthesized image quality assessment based on morphological wavelets
most of the depth image based rendering (dibr) techniques produce synthesized images which contain nonuniform geometric distortions affecting edges coherency. this type of distortions are challenging for common image quality metrics. morphological filters maintain important geometric information such as edges across di...
242
oblique projection based receiver with interference cancellation in ofdma uplink
this paper presents an oblique projection-based detection scheme with the assistance of parallel/successive interference cancellation (pic/sic) in the uplink of interleaved orthogonal frequency division multiple access (ofdma) systems. for every transmitted symbol, pic is first invoked to remove the multiple user inter...
soft information assisted space-time multiuser detection for highly loaded cdma
this letter presents an effective space-time multiuser detector (mud) with the assistance of soft information in multipath code division multiple access (cdma) channels. the space-time mud considered is a simple, separable spatial-temporal filter which consists of a single spatial filter and a single temporal filter. b...
243
semiglobal robust regulation of nonlinear systems
this paper describes a recent approach to the problem of output regulation of nonlinear systems, which unifies and extends a number of earlier results on the subject. in particular the approach in question yields necessary and sufficient conditions for local structurally stable regulation and, for special classes of no...
semiglobal stabilization via measurement feedback for systems in triangular form
we consider the problem of semiglobally stabilizing a wide class of uncertain nonlinear system, which is made up of a linear nominal system affected by model uncertainties or nonlinearities. our approach is based on h/sub /spl infin// control tools and recovers existing results on the semiglobal stabilization via outpu...
244
from acme to corba: bridging the gap
software architecture and middleware platforms are different abstraction levels of component-based development that have been evolved separately. in order to address the gap between these two areas, in this paper we discuss the integration of a generic and extensible architecture description language, acme, with a stan...
integrating software architecture concepts into the mda platform with uml profile
architecture description languages (adls) provide an abstract representation of software systems. achieving a concrete mapping of such representation into the implementation is one of the principal aspects of mda (model driven architecture). integration of adls within mda confers to the mda platform a higher level of a...
245
estimating the center of gravity of an object using tilting by multiple mobile robots
in transporting various objects by multiple mobile robots we need to change the formation of robots and posture of an object. this planning depends on the mass and center of gravity of an object. here we discuss the accuracy of the estimation of the mass and the position of the center of gravity of an object. particula...
let us work together-task planning of multiple mobile robots
this paper surveys former studies on task planning of multiple mobile robots. task planning algorithms are categorized into four from two issues: dimensions of tasks demands (point-reaching tasks and region-sweeping tasks), and the number of iteration of the task (one-time tasks and iterative tasks). individual studies...
246
trickle++: a context-aware trickle algorithm
we propose to augment the trickle algorithm with contextual information freely and locally available in low-power wireless networking technologies. the aim is to equip trickle with hints and heuristics allowing it to propagate updates faster using link indicators such as received signal strength and link quality indica...
adaptive approaches to relieving broadcast storms in a wireless multihop mobile ad hoc network
in a multihop mobile ad hoc network, broadcasting is an elementary operation to support many applications. previously, it is shown that naively broadcasting by flooding may cause serious redundancy, contention, and collision in the network, which we refer to as the broadcast storm problem. several threshold-based schem...
247
circuit-sharing design between fft and imdct with pipeline structure for dab receiver
in this paper, a "circuit-sharing scheme" is proposed to design a reduced chipset for dab (digital audio broadcasting) receiver, involved the fast fourier transform (fft) circuit in the orthogonal frequency division multiplexing (ofdm) and imdct (inverse modified discrete cosine transform) synthesis filter in the audio...
fast subband filtering in mpeg audio coding
subband filtering is one of the most compute-intensive operations in the mpeg audio coding standard. the author proves that the matrixing operations in mpeg subband filtering can be efficiently computed using fast 32-point dct or inverse dct (idct) algorithms. >
248
reader-aware multi-document summarization: an enhanced model and the first dataset
we investigate the problem of reader-aware multi-document summarization (ra-mds) and introduce a new dataset for this problem. to tackle ra-mds, we extend a variational auto-encodes (vaes) based mds framework by jointly considering news documents and reader comments. to conduct evaluation for summarization performance,...
centroid-based summarization of multiple documents: sentence extraction, utility-based evaluation, and user studies
we present a multi-document summarizer, called mead, which generates summaries using cluster centroids produced by a topic detection and tracking system. we also describe two new techniques, based on sentence utility and subsumption, which we have applied to the evaluation of both single and multiple document summaries...
249
on the complexity of non-projective data-driven dependency parsing
in this paper we investigate several non-projective parsing algorithms for dependency parsing, providing novel polynomial time solutions under the assumption that each dependency decision is independent of all the others, called here the edge-factored model. we also investigate algorithms for non-projective parsing tha...
global transition-based non-projective dependency parsing
shi, huang, and lee (2017) obtained state-of-the-art results for english and chinese dependency parsing by combining dynamic-programming implementations of transition-based dependency parsers with a minimal set of bidirectional lstm features. however, their results were limited to projective parsing. in this paper, we ...
250
semantic integration in learning from text.
we define learning as the generation of meaningful knowledge representations which can be utilized in future decision making. optimal learning entails that these knowledge representations be integrated with prior knowledge. in this paper, we introduce a knowledge representation based on an integration of a variety of s...
using predicate-argument structures for information extraction
in this paper we present a novel, customizable ie paradigm that takes advantage of predicate-argument structures. we also introduce a new way of automatically identifying predicate argument structures, which is central to our ie paradigm. it is based on: (1) an extended set of features; and (2) inductive decision tree ...
251
quantitative evaluation of discrete event systems: models, performances and techniques
assuming that with the increasing complexity of new architectures, modeling and performance evaluation of discrete event systems are more and more necessary, the authors present some general remarks on the modeling concept. queuing networks, whose theory has been stimulated by needs in the computing field, are presente...
performance evaluation of asynchronous concurrent systems using petri nets
some analysis techniques for real-time asynchronous concurrent systems are presented. in order to model clearly the synchronization involved in these systems, an extended timed petri net model is used. the system to be studied is first modeled by a petri net. based on the petri net model, a system is classified into ei...
252
a four quadrant analog multiplier based on a novel cmos linear current divider
an analog, gilbert-like cmos multiplier, based on a novel linear current divider, is described. the divider uses a cascade of two differential pairs to produce a linear dependence between the tail current and the two output currents. a numerical algorithm has been implemented to find the optimum sizing of the active de...
design of an error detector circuit for bpsk costas loop for carrier synchronization in millimeter-wave receivers
this paper presents the system requirements for the implementation of an error detector in costas loops for carrier synchronization in millimeter-wave receivers. when the inputs to a circuit are baseband signals, there is a need for dc coupling, four-quadrant operation and linear processing on the signals. based on the...
253
curtailing latency in data center network by adopting jumbo frames
nowadays data centers are attracting a huge attention of researchers. the performance of the data centers is key to hold the successes of cloud computing. as dimensions of cloud computing are enhanced by offering multiple services, the responsibility of service provider escalates many folds. even hosting single service...
jumbo frames or not: that is the question!
we focus on a simple question in this paper: should data center network operators turn on ethernet jumbo frames? while prior work supports using jumbo frames for their throughput and cpu benefits, it is not clear whether these results are directly applicable to data center networks, particularly since they were perform...
254
light-assisted a* path planning
this paper introduces a novel variant of the a^@? path planning algorithm, which we call light-assisted a^@? (or la^@? for short). the la^@? algorithm expands less nodes than a^@? during the search process, especially in scenarios where there are complex-shaped obstacles in the path between the start and goal nodes. th...
fuzzy-enhanced path-finding algorithm for agv roadmaps
path-finding algorithms (pfa) are successfully used to find the optimal path between two locations. good results are obtained if they are used in scenarios where the entire environment can be described mathematically. production environments of automated guided vehicles (agvs) are not one of those. pfa find solutions t...
255
programming abstractions for dynamically partitioning and coordinating localized scientific calculations running on multiprocessors
certain software abstractions help to automate load balancing during various math-physics calculations on a team of concurrently executing processors. these abstractions have been tested on a vortex method for computational fluid dynamics. experiments exhibited good parallel speedups of 24 and 3.6,respectively, on 32 p...
software support for irregular and loosely synchronous problems
abstract a large class of scientific and engineering applications may be classified as irregular and loosely synchronous from the perspective of parallel processing. we present a partial classification of such problems. this classification has motivated us to enhance fortran d to provide language support for irregular,...
256
performance and routability improvements for routability-driven fpga routers
routing fpgas (verma, 1999) is a challenging problem because of the relative scarcity of routing resources represented in wires and connection points. this can lead either to slow implementations caused by long wiring paths that avoid congestion or a failure to route all signals (mcmurchie, 1995). this paper presents s...
congestion and track usage improvement of large fpgas using metro-on-fpga methodology
asynchronous serial transceivers have been recently used for data multiplexing in large on-chip systems to alleviate the routing congestion and improve the routability. fpgas have considerable potential for using the serial transmission but these links have not been exploited in fpgas yet. in this paper, we present a n...
257
generation of large-scale maps of science and associated indicators.
over the past several years, techniques have been developed for clustering very large segments of the technical literature using sources such as thomson isi's science citation index. the primary objective of this work has been to develop indicators of potential impact at the paper level to enhance planning and evaluati...
visualizing science by citation mapping
science mapping is discussed in the general context of information visualization. attempts to construct maps of science using citation data are reviewed, focusing on the use of co-citation clusters. new work is reported on a dataset of about 36,000 documents using simplified methods for ordination, and nesting maps hie...
258
low-complexity online synthesis for amidar processors
future chip technologies will change the way ::: we deal with hardware design. first of all, logic resources ::: will be available in vast amount. furthermore, engineering ::: specialized designs for particular applications will no longer be ::: the general approach as the nonrecurring expenses will grow ::: tremendous...
mapping applications onto reconfigurable kress arrays
this paper introduces a design space explorer for coarse-grained reconfigurable kressarray architectures – to enable the designer to find out the optimal kressarray architecture for a given application. this tool employs a mapper based on simulated annealing, and is highly configurable for a variety of different kressa...
259
development and evaluation of audio-visual asr: a study on connected digit recognition
abstract : we present our findings from audio-visual speech recognition experiments for connected digit recognition in noisy environments. we derive hybrid (geometric- and appearance-based) visual lip features using a real-time lip tracking algorithm that we proposed previously. using a small single-speaker corpus mode...
fundamentals of speech recognition
with the arrival of the era of multimedia application,various new techniques have come into existence.the speech recognition technology is being widely used in real life.the paper simply introduces and analyzes the fundamentals of speech recognition,and use the speech recognition system of windows 7 to make readers fur...
260
a new generic model for signal propagation in wi-fi and wimax environments
the ability to accurately predict radio propagation behavior for wireless communication systems, such as cellular mobile radio, is becoming crucial to system design. since site measurements are costly, propagation models have been developed as suitable, low-cost, and convenient alternative. in this paper, we will propo...
challenges in developing wifi wide coverage access for river information services on the danube river
in this paper the authors present the state of the art regarding wireless communications for river information services (ris), developed or in development on the danube river, taking also into account signal propagation issues. wifi technologies and equipment are investigated along with the technological challenges suc...
261
artificial-noise-aided nonlinear secure transmission for mu-miso wiretap channel with quantized csit
we consider nonlinear transceiver design for downlink multiuser multi-antenna secure communications with an external multi-antenna eavesdropper. the multi-antenna transmitter simultaneously transmits confidential-message-bearing signals and artificial noise (an) using nonlinear tomlinson harashima precoding based on th...
tomlinson-harashima precoding design in mimo wiretap channels based on the mmse criterion
this paper investigates the tomlinson-harashima precoding (thp) design for secure communications in broadcast multiple-input multiple-output (mimo) systems in the presence of a passive eavesdropper. we focus on optimizing the nonlinear transceiver to guarantee a certain quality-of-service (qos) level for the intended r...
262
streaming distribution of a live seminar: rudimentary knowledge for lsi design
we gave a weekly lecture 10 times in raw using ustream. the text, slides were uploaded in advance on our web site, and the students asked questions through twitter. we announced the lecture date and time by our mailing list, then more than 500 students registered and more than 150 students took the lecture in real time...
design of analog cmos integrated circuits
thank you for downloading design of analog cmos integrated circuits. maybe you have knowledge that, people have look hundreds times for their chosen books like this design of analog cmos integrated circuits, but end up in malicious downloads. rather than enjoying a good book with a cup of coffee in the afternoon, inste...
263
pempi-from mpi standard to programming environment
the message passing interface (mpi), as an effort to unify message passing systems to achieve portability, defines a widely used standard for writing message passing programs. but mpi alone operates on a rather system-oriented level and does not provide higher abstractions that are mandatory when developing large scale...
early applications in the message-passing interface (mpi)
we describe a number of early efforts to make use of the message-passing interface mpi standard in appli cations, based on an informal survey conducted in may-june, 1994. rather than a definitive statement of all mpi developmental work, this paper addresses the initial successes, progress, and impressions that appli ca...
264
a (de)composable theory of rhythm perception
a definition is given of expectancy of events projected into the future by a complex temporal sequence. the definition can be decomposed into basic expectancy components projected by each time interval implicit in the sequence. a preliminary formulation of these basic curves is proposed and the (de)composition method i...
musical interactions with a perceptual robotic percussionist
we present our approach for human-robot musical interaction using a perceptual and socially-oriented robotic percussionist. our robot, named haile, listens to live players, analyzes perceptual musical aspects in real-time, and uses the product of this analysis to playback in an acoustically rich manner, forming musical...
265
a chosen message attack on iso/iec 9796-1 signature scheme
we introduce an attack against the iso/iec 9796-1 digital signature scheme using redundancy, taking advantage of the multiplicative property of the rsa and rabin cryptosystems. the forged signature of 1 message is obtained from the signature of 3 others for any public exponent v. for even v, the modulus is factored fro...
handbook of applied cryptography
from the publisher: ::: a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography, this book provides easy and rapid access of information and includes more than 200 algorithms and protocols; more than 200 tables and figures; more than 1,000 number...
266
texture coordinate compression for 3-d mesh models using texture image rearrangement
previous works related to texture coordinate coding of the three-dimensional(3-d) mesh models employed the same predictor as the geometry coder. however, discontinuities in the texture coordinates cause unreasonable prediction. especially, discontinuities become more serious for the 3-d mesh model with a non-atlas text...
an entropy coding method for floating-point texture coordinates of 3d mesh
3d mesh compression has been studies for compact storage and fast transmission of large 3d meshes for a variety of graphics applications. however, there is still much redundancy not well exploited by the previous works, e.g., the redundancy lying in the floating-point data texture coordinates. this paper investigates t...
267
modelling and parameter estimation of a ship boiler
this paper deals with the identification and parameter estimation part of an adaptive control system for a ship boiler. the adaptive control system should be of such a form that it could be implemented on a minicomputer and easily adjusted to other ship boilers with similar characteristics. a nonlinear model of the pro...
passivity based control of drum boiler
in this paper, we propose a novel state space model for the drum boilers with natural recirculation. the states of this model are the total mass and energy inventories. the main advantage of the model is that it has an affine structure in control variables. a passivity based inventory controller is developed, which ens...
268
a profiling tool for heterogeneous multi-core systems
profiling is a process of collecting relevant data about the execution of an application. this is done in order to reveal code bottlenecks, measure the performance, and give detailed information about source code function contents and call graphs of the examined application. in this paper we present one such profiling ...
gprof: a call graph execution profiler
we extended the unix® system's profiler by gathering arcs in the call graph of a program. here is it 20 years later and this profiler is still in daily use. why is that? it's not because there aren't well-known areas for improvement.large complex programs are composed of many small routines that implement abstractions ...
269
mdac design for an 8-bit 40 ms/s pipelined adc in a 0.18μm cmos process
this paper presents an mdac (multiplying digital-to-analog converter) for a low power eight bit and 40- ms/s pipeline adc (analog-to-digital converter). the operational amplifier (op-amp) dedicated fir this type of converters is performed by using telescopic architecture that has the advantages of low power and less-ar...
comparative study of two cmos operational amplifiers for high performance pipelined adc
this paper explains the choices taken for the design of two full differential operational amplifiers (op-amps). these op-amps have been designed for a mdac (multiplying digital-to-.analog converter) stage of a pipelined adc (analog to digital converter). it shows also the solutions found to reach high gain, wide bandwi...
270
toward a protected cloud against side channel attacks: a game-theoretic framework
in a side-channel collocation attack on a multitenant public cloud, an adversary seeks to leak sensitive information through launching malicious virtual machines (vms) that would collocate with the victim vm and bypass the isolation provided by the hypervisor. this paper presents a game-theoretic framework to study the...
memory deduplication as a threat to the guest os
memory deduplication shares same-content memory pages and reduces the consumption of physical memory. it is effective on environments that run many virtual machines with the same operating system. memory deduplication, however, is vulnerable to memory disclosure attacks, which reveal the existence of an application or ...
271
low complexity intra video coding using transform domain prediction
in this paper, a new low complexity intra coding framework is presented. the proposed method is extremely computationally efficient as it uses intra prediction in the dct domain. to facilitate finding a good predictor, we propose to extend the number of neighouring blocks to be searched, based on a consideration of the...
low complexity video compression using moving edge detection based on dct coefficients
in this paper, we propose a new low complexity video compression method based on detecting blocks containing moving edges using only dct coefficients. the detection, whilst being very efficient, also allows efficient motion estimation by constraining the search process to moving macro-blocks only. the encoders psnr is ...
272
position paper: crdts for large-scale incremental processing
we propose a new approach for building distributed large-scale applications such as a social network or a search engine. it is based on high-level, conflict-free abstract data types interconnected with a dataflow-style notification network. this approach allows to replicate objects widely, close to the edge of the netw...
crdts: consistency without concurrency control
a crdt is a data type whose operations commute when they are concurrent. replicas of a crdt eventually converge without any complex concurrency control. as an existence proof, we exhibit a non-trivial crdt: a shared edit buffer called treedoc. we outline the design, implementation and performance of treedoc. we discuss...
273
ethical hacking and password cracking: a pattern for individualized security exercises
a design pattern provides a type of template or meta-template for solving design problems. this paper provides and discusses a pattern for creating individualized learning exercises. the domain of application is security education. the specific examples presented, that have been realized in practice in an educational s...
combining an e-commerce simulation with a cyber-survivor exercise
a cyber-survivor exercise is an learning experience whereby each team of students attempts to defend their computer network against attacks by security educators. one of the difficulties in creating a meaningful contest is in both scoring how well each team did and in creating an environment that requires business deci...
274
analysis and implementation of the max-nlms adaptive filter
we provide an efficient implementation and a statistical analysis of the max-nlms adaptive filter. this adaptive filter only adjusts the coefficient associated with the data element that has the maximum absolute value in the filter memory at each iteration. our method for determining this maximum absolute data value re...
a learning method for system identification
a method for system identification is proposed which is based on the error-correcting training procedure in learning machines, and is referred to as "learning identification." this learning identification is nondisturbing, is applicable to cases where the input signal is random and nonstationary, and can be completed w...
275
user centered technologies research institute
in this paper we describe the user centered technologies research institute at university of applied sciences vorarlberg. we illustrate the perspectives on hci efforts concerning analogous communication in multi-modal hci as well as our research and development services for enterprises in order to support user centered...
universal access in hci : inclusive design in the information society
universal access and design for all assistive technologies mobile and ubiquitious interaction adaptation and personalization access to information user diversity accessibility and usability applications and services non-visual interaction interaction devices, techniques and modalities design and evaluation tools.
276
pricing decision and lead time setting in a duopoly semiconductor industry
pricing and lead time setting are two important decisions in semiconductor foundry industries. this research considers the competition of a duopoly market consisting of two make-to-order firms in semiconductor foundry industries and presents a model to determine the equilibrium price and lead time of these two competin...
time – the next source of competitive advantage
a captive panel fastener assembly comprising a stud having three splines substantially along its length, a retaining ring with inwardly extending tabs slidably riding within said splines and a plug press-fitted to a bore at the forward end of the stud. after insertion of the stud through a hole in a panel, to which the...
277
the role of semantic processing in an automatic speech understanding system
we present the semantics component of a speech understanding and dialogue system that is developed at our institute. due to pronunciation variabilities and vagueness of the word recognition process, semantics in a speech understanding system has to resolve additional problems. its main task is not only to build up a re...
semantics in speech recognition and understanding: a survey
this survey paper aims at summarizing the state of the art of computational semantic methods in speech recognition and understanding research. a taxonomy classifying the approaches adopted in the literature is divided into six main categories: semantic networks, semantic grammars, caseframes, statistical, unification-b...
278
defocus-based image segmentation
foreground and background features are focused (or defocused) differently in an image because corresponding objects are at different depths in the scene. this paper presents a novel approach for segmenting foreground and background in video images based on feature defocus. a modified defocus measurement that distinguis...
estimating defocus blur via rank of local patches
this paper addresses the problem of defocus map estimation from a single image. we present a fast yet effective approach to estimate the spatially varying amounts of defocus blur at edge locations, which is based on the maximum ranks of the corresponding local patches with different orientations in gradient domain. suc...
279
adaptive manipulation of a hybrid mechanism mobile robot
this paper reports experimental and analytical results of a hybrid mechanism mobile robot (hmmr) designed for field and military applications. the hmmr presented in this paper constitutes the second generation of a mobile robot that combines locomotion with manipulation in a symmetric invertible platform. the experimen...
towards mobile manipulator safety standards
we present an overview of the current (as of spring, 2013) safety standards for industrial robots and automated guided vehicles (agvs). we also describe how they relate to the safety concerns of mobile manipulators (robot arms mounted on mobile bases) in modern manufacturing. provisions for the capabilities of mobile m...
280
an improved working set selection method for svm decomposition method
the support vector machine learning problem is a convex quadratic programming problem. for large learning tasks with many training examples, the general quadratic programs quickly become intractable in their memory and time requirements. thus the decomposition method is essential for the support vector machine learning...
an improved decomposition algorithm for regression support vector machines
a new decomposition algorithm for training regression support vector machines (svm) is presented. the algorithm builds on the basic principles of decomposition proposed by osuna et. al., and addresses the issue of optimal working set selection. the new criteria for testing optimality of a working set are derived. based...
281
datapath oriented codesign method of application specific dsps using retargetable compiler
proposes a "datapath oriented" codesign methodology, which uses datapath configurations and horizontal codes, instead of instruction set specifications as an interface between hardware and software. given an application program and a dsp datapath configuration, the control part of the dsp is synthesized and a horizonta...
symbolic modeling and evaluation of data paths
we present an automata model which concisely captures the constraints imposed by a data-path, such as bus hazards, register constraints, and control encoding limitations. a set of uniform base components for depicting general data-paths and techniques for systematic translation of such depictions into boolean functions...
282
a fast adaptive layout algorithm for undirected graphs
we present a randomized adaptive layout algorithm for nicely drawing undirected graphs that is based on the spring-embedder paradigm and contains several new heuristics to improve the convergence, including local temperatures, gravitational forces and the detection of rotations and oscillations. the proposed algorithm ...
dynamic parameter spring modeling algorithm for graph drawing
this paper proposes a modified spring modeling algorithm for drawing undirected graphs, that is an extension of the forceddirected placement method of spring modeling algorithm by eades. we call it dynamic parameter spring modeling algorithm. this algorithm is not only a general algorithm for graph layout, but also it ...
283
information service model with mobile agent supported
mobile agent is a kind of novel agent technology characterized by mobile, intelligent, parallel and asynchronous computing. in this paper, a new information service model that adopts mobile agent technology is introduced first, and then an experimental system doltria system that is implemented based on the model is des...
market-based resource control for mobile agents
mobile agents are programs that can migrate from machine to machine in a heterogeneous network. as mobile agents move across a network,they consume resources. not only is there the additional congestion incurred through normal mobile agent use,but there are additional risks from denial-of-service attacks and other irre...
284
time space sharing scheduling: a simulation analysis
we explain a new job scheduling class, called “time space sharing scheduling” (tsss) for partitionable parallel machines. tsss is a combination of time-sharing and space-sharing job scheduling techniques. our proposed “distributed queue tree” (dqt) is an instance of tsss. we evaluate and analyze dqt behavior in more de...
overhead analysis of preemptive gang scheduling
a preemptive gang scheduler is developed and evaluated. the gang scheduler, called score-d, is implemented on top of a unix operating system and runs on workstation and pc clusters connected by myrinet, a giga-bit class, high-performance network.
285
property-oriented testing of real-time systems
although statecharts has gained widespread use as a formalism for modeling reactive real-time systems, testing these systems still confronts some difficulties, of which a major one is the existence of numerous and complex system behaviors. it is extremely difficult to conduct comprehensive and in-depth testing of such ...
generating test cases for real-time systems based on symbolic models
the state space explosion problem is one of the challenges to be faced by test case generation techniques, particularly when data values need to be enumerated. this problem gets even worse for real-time systems (rts) that also have time constraints. the usual solution in this context, based on finite state machines or ...
286
switch++: an output device of the switches by the finger gestures
regarding human-machine-interfaces, switches have not changed significantly despite the machines themselves evolving constantly. in this paper, we propose a new method of operability for devices by providing multiple switches dynamically, and users choose the switch that has the functionality that they want to use. swi...
haptic chameleon: a new concept of shape-changing user interface controls with force feedback
in this paper, we introduce the concept of shape-changing, user interface control devices called "haptic chameleon", which refers to computer-controlled user interface devices that convey information to and from the user by altering their shape and feel. the user decides what a haptic chameleon control will do by chang...
287
object based grid architecture for enhancing security in grid computing
this paper describes a simple logical method to enhance the security in the grid computing. object based grid architecture (oga) is a grid architecture based on object oriented concept to enhance the security in grid computing. in the grid environment the data and the process will be a public one since the job is execu...
the anatomy of the grid - enabling scalable virtual organizations
the term "the grid" was coined in the mid-1990s to denote a proposed distributed computing infrastructure for advanced science and engineering [4]. considerable progress has since been made on the construction of such an infrastructure (e.g., [1,6,7]) but the term "grid" has also been conflated, at least in popular per...
288
use of chaotic sequences in a biologically inspired algorithm for engineering design optimization
recent computational developments in ant colony systems have proved fruitful for transforming discrete domains of application into continuous ones. in this paper, new combinations of an ant colony inspired algorithm (aca) and chaotic sequences (ach) are employed in well-studied continuous optimization problems of engin...
good lattice swarm algorithm for constrained engineering design optimization
engineering optimization in the intelligence swarm remains to be a challenge. recently, a novel optimization method based on number-theory and particle swarm, good lattice swarm optimization algorithm (glso), is introduced, which intends to produce faster and better global search ability and more accurate convergence b...
289
froth image segmentation based on adaptive ray cluster
there are a number of noise areas, blur and adhesive froths in flotation image, with which classical watershed has no corresponding mechanism to cope. the paper proposes a segmentation algorithm of adaptive ray cluster, seed region are extracted by visiting every pixel just once and then noise areas are removed out. ra...
texture feature clustering and segmentation algorithm based on pixel
as the coverage area of the sub-block is too large, the texture feature clustering based on sub-block often produces the mosaic phenomenon of inaccurate boundary. in this paper, the texture clustering algorithm based on pixel extracts the texture feature vector of its central pixel point from sub-block. the image textu...
290
study of cordic algorithm based on fpga
the coordinate rotational digital computer(cordic)algorithm can transform the complicated mathematical function into simple operation of add and shift, therefore it is widely used in hardware realization of digital signal process(dsp) algorithm. the pipelined operational circuit of cosine and sine functions based on co...
real-time s-scan imaging reconstruction for ultrasonic phase array based on cordic and sectorial interpolation algorithms
in the sectorial scan (s-scan) view of the ultrasound phase array system, the echo data produced from the ultrasonic sensors usually are acquired in the polar coordinates, but need to be displayed in the cartesian coordinates, which can then realize image reconstruction with pixel filling technology. to effectively per...
291
parking slot identification using local binary pattern and support vector machine
parking space availability has become common problem in many big cities. this problem occurs due to fast growing of vehicle ownership. therefore, the demand of parking area in big cities is also increased. an information system on parking space availability may help the driver to find accurately the parking location. t...
a method of parking space detection based on image segmentation and lbp
this paper proposes a novel parking spaces detection algorithm which is based on image segmentation and local binary pattern. the vehicles are usually contains a lot of compositions, while the vacant parking spaces' composition is relatively small. according to this characteristic, we segment the parking image. to judg...
292
smart design of similarity relations for fuzzy logic programming environments
similarity relations are used in several fuzzy logic programming environments like floper, which has been developed in our research group along the last decade. strongly connected with this system, in this paper we show how its auxiliary latticemakertool has been extended for aiding the graphical design of such structu...
fuzzy logic and the resolution principle
abstract the relationship between fuzzy logic and two-valued logic in the context of the first order predicate calculus is discussed. it is proved that if every clause in a set of clauses is something more than a “half-truth” and the most reliable clause has truth-value a and the most unreliable clause has truth-value ...
293
igp link weight assignment for transient link failures
intra-domain routing in ip backbone networks relies on link-state protocols such as is-is or ospf. these protocols associate a weight (or cost) with each network link, and compute traffic routes based on these weight. however, proposed methods for selecting link weights largely ignore the issue of failures which arise ...
reconfiguration in multi class of services networks
this paper presents an optimisation method to traffic engineer networks carrying different classes of traffic. the novel mixed integer programming model is based on the classical multi-commodity flow problem. although some initial input data (such as topology and traffic matrix) is required, the method can be directly ...
294
the role of constraints and discontinuities in visible-surface reconstruction.
nitrogen-heterocyclic phosphonic acids and derivatives thereof characterized by aminomethyl (or substituted methyl) phosphonic acids or derivatives thereof bonded directly or indirectly, i.e., through a n-side chain to the nitrogen atom in the heterocyclic ring, for example those containing in the molecule at least one...
geometrical modeling from multiple stereo views
the components of the sheffield artificial intelligence vision research unit (aivru) three-dimensional (3d) vision sys tem, which currently supports model-based object recognition and location, are described. its potential for robotics applica tions is demonstrated by its guidance of a universal machine intelligence ro...
295
segmentation of isolated and touching characters in offline handwritten gurmukhi script recognition
segmentation of a word into characters is one of the important challenges in optical character recognition. this is even more challenging when we segment characters in an offline handwritten document. touching characters make this problem more complex. in this paper, we have applied water reservoir based technique for ...
devanagari handwritten text segmentation for overlapping and conjunct characters- a proficient technique
optical character recognition alludes to the methodology of taking images or photos of letters or typewritten content and changing over them into information that a machine can easily interpret, e.g. organizations and libraries taking physical duplicates of books, magazines, or other old printed material and utilizing ...
296
high speed, low power n/ (n+1) prescalerusing tspc and e-tspc: a survey
one of the important functional blocks in frequency synthesizers is the high speed dual modulus prescaler. prescaler determines how fast the frequency synthesizer is. the bottleneck of the dual modulus prescaler design is that it operates at the highest frequencies and consumes more power than any other circuit blocks ...
a 1.6-ghz dual modulus prescaler using the extended true-single-phase-clock cmos circuit technique (e-tspc)
the implementation of a dual-modulus prescaler (divide by 128/129) using an extension of the true-single-phase-clock (tspc) technique, the extended tspc (e-tspc), is presented. the e-tspc consists of a set of composition rules for single-phase-clock circuits employing static, dynamic, latch, data-precharged, and nmos-l...
297
curvature scale space corner detector with adaptive threshold and dynamic region of support
corners play an important role in object identification methods used in machine vision and image processing systems. single-scale feature detection finds it hard to detect both fine and coarse features at the same time. on the other hand, multi-scale feature detection is inherently able to solve this problem. this pape...
contextual models for automatic building extraction in high resolution remote sensing image using object-based boosting method
many traditional target extraction methods encountered new challenges as the spatial resolution is increasing quickly. for the purpose of extracting buildings in that circumstance, a new method combing both the object-based approach and boosting algorithm is proposed in this paper. the method associates segmentation wi...
298
formal verification of object-oriented graph grammars specifications
concurrent object-oriented systems are ubiquitous due to the importance of networks and the current demands for modular, reusable, and easy to develop software. however, checking the correctness of such systems is a hard task, mainly due to concurrency and inheritance aspects. in this paper we present an approach to th...
explicit state model checking for graph grammars
in this paper we present the philosophy behind the groove project, in which graph transformation is used as a modelling formalism on top of which a model checking approach to software verification is being built. we describe the basic formalism, the current state of the project, and (current and future) challenges.
299
vhf filtering with digital programmability and accumulation mos-c
in this paper we report a design strategy for vhf filtering in standard digital cmos processes. the design approach is based on fully-balanced pseudo-differential continuous-time transconductors for applications in low-voltage systems over the vhf range and implemented with mos-c accumulation capacitors. a 3rd-order gm...
a precision variable-supply cmos comparator
several new techniques are presented for the design of precision cmos voltage comparator circuits which operate over a wide range of supply voltages. since most monolithic a/d converter systems contain an on-chip voltage reference, techniques have been developed to replicate the reference voltage in order to provide st...
300