In this study, the LAPSs(Light Addressable Potentiometric Sensors) which have devices of Si3N4/SiO2/Si, Ta 2O5/SiO2/Si structure were fabricated. Also, it was investigated the response characteristics to penicillin co...
详细信息
In this paper, we propose a novel active queue management (AQM) scheme based on the Random Early Detection (RED) of the loss ratio and the total sending rate control, called LRC-RED, to regulate the queue length with ...
详细信息
ISBN:
(纸本)0769524052
In this paper, we propose a novel active queue management (AQM) scheme based on the Random Early Detection (RED) of the loss ratio and the total sending rate control, called LRC-RED, to regulate the queue length with small variation and to achieve high utilization with small packet loss. this scheme measures the latest packet loss ratio, and uses it and the total sending rate as complements to queue length in order to dynamically adjust packet drop probability. Further, we also provide the design rules for this scheme based on the well-known TCP control model. On the basis of the design rules, we develop a simple, scalable and systematic rule for tuning the control parameters which can be adaptive to dynamic network conditions. through ns 2 simulations, we show the faster response time and better robustness of the proposed LRC-RED as compared withthe Loss Ratio based RED (LRED) [5] algorithm.
After 10 years of UML we have still not overcome the problems of the CASE tools of the 1980s. Imposing a "one size fits all" modeling language and generators has not significantly increased developers' p...
详细信息
this book constitutes the refereed proceedings of the 10th Asia-Pacific computersystems Architecture conference, ACSAC 2005, held in Singapore in October *** 65 revised full papers presented were carefully reviewed a...
详细信息
ISBN:
(数字)9783540321088
ISBN:
(纸本)9783540296430
this book constitutes the refereed proceedings of the 10th Asia-Pacific computersystems Architecture conference, ACSAC 2005, held in Singapore in October *** 65 revised full papers presented were carefully reviewed and selected from 173 submissions. the papers are organized in topical sections on energy efficient and power aware techniques, methodologies and architectures for application-specific systems, processor architectures and microarchitectures, high-reliability and fault-tolerant architectures, compiler and OS for emerging architectures, data value predictions, reconfigurable computing systems and polymorphic architectures, interconnect networks and network interfaces, parallel architectures and computation models, hardware-software partitioning, verification, and testing of complex architectures, architectures for secured computing, simulation and performance evaluation, architectures for emerging technologies and applications, and memory systems hierarchy and management.
this paper describes an application of information retrieval techniques to automated industry and occupation code classification for Korean Census records. the purpose of the proposed system is to convert natural lang...
详细信息
Modern business systems need to cater to rapidly evolving business requirements in an ever-shrinking window of opportunity. Modern business systems also need to keep pace with rapid advances in technology. For develop...
详细信息
ISBN:
(数字)9783540317975
ISBN:
(纸本)3540250816
Modern business systems need to cater to rapidly evolving business requirements in an ever-shrinking window of opportunity. Modern business systems also need to keep pace with rapid advances in technology. For developing large and complex applications, industrial practice has traditionally used a combination of non-formal notations and methods. Different notations are used to specify the properties of different aspects of an application and these specifications are transformed into their corresponding implementations through the steps of a development process. the development process relies heavily on manual verification to ensure the different pieces integrate into a consistent whole. this is an expensive and error-prone process demanding large teams with broad-ranging expertise in business domain, architecture and technology platforms. We present a model-driven development approach that addresses this problem by providing a set of modeling notations for specifying different layers of a system namely user interface, application functionality and database;a set of code generators that transform these models into platform-specific implementations;an abstraction for organizing application specification into work-units and an associated tool-assisted development process. Models, being at a higher level of abstraction, are easier to understand and verify for properties of interest. Model based code generation incorporating proven design and architectural patterns results in significant gains in productivity and uniformly high quality. Models defined using these different notations are instances of a single meta model. this enables well-formedness constraints to be specified between different models ensuring their consistency leading to smooth integration of implementations of these models. the approach has been used extensively to construct medium and large-scale enterprise applications resulting in improved productivity, better quality and platform independence. We als
Fast recovery from software and hardware failures is very essential to communication systems, especially, when it is used for mission-critical applications such as public safety systems. A failure in the network infra...
详细信息
Fast recovery from software and hardware failures is very essential to communication systems, especially, when it is used for mission-critical applications such as public safety systems. A failure in the network infrastructure can affect a large number of users and may result in loss of lives. the infrastructure software applications that provide services to the mobile stations according to some defined communication protocols play a key role for system availability. the real-time peer-to-peer nature of these communication protocols poses a real challenge in developing a recovery mechanism that can work in such environments. In this paper, we introduce a new recovery method that takes into account the layered architecture of the communication protocols and their peer-to-peer communication pattern. the method is based on communicating extended finite state machine and does not assume transient and fail-stop failures. Furthermore, an experimental testbed has been implemented to evaluate our new approach. the experimental results have shown that the infrastructure applications can reliably recover and quickly restore the servicing level that the system was performing immediately prior to the failure. Moreover, the failure-free overhead caused by this approach is relatively low, and is experimentally found to be less than 5%.
Principal component analysis (PCA) finds wide usage in computer-aided vision applications and one such application is face recognition. the neural network that performs PCA is called a principal component neural netwo...
详细信息
ISBN:
(纸本)0769522645
Principal component analysis (PCA) finds wide usage in computer-aided vision applications and one such application is face recognition. the neural network that performs PCA is called a principal component neural network (PCNN). this paper presents a new PCNN-based face recognition system. the proposed recognition system can tolerate local variations in the face such as expression changes and directional lighting. An optimal digital hardware design is proposed for PCNN. An ASIC implementation of the proposed design yields a throughput of processing about 11,000 inputs per second during the training phase and about 19,000 inputs per second during the retrieval phase. the customized hardware-based recognition is about 10/sup 5/ times faster than a software-based recognition in a PC. Such results are valuable for high-speed applications.
this paper proposes a multiscale corner detection method for gray level images based on scale-space theory and Plessey operator. the proposed method solves three problems existing in the original Plessey detector. Fir...
详细信息
this paper proposes a multiscale corner detection method for gray level images based on scale-space theory and Plessey operator. the proposed method solves three problems existing in the original Plessey detector. First, it works in the scale-space domain, so it detects corners belonging to different scales instead of a certain scale. Second, only one parameter needs to be set instead of three parameters needed in the original Plessey method. third, delocalization is a well-known inherent drawback of the Plessey corner operator and it will increase withthe scale at which it operates. the proposed algorithm solves the problem by detecting the corners from small scale to large scale, then track back from large scale to small scale. As the delocalization in the smallest scale can be ignored, the proposed method obtain the accurate localization. this proposed multiscale scheme can also be applied to other spatial corner detectors to improve their performances. the simulation results and the application in stereo matching show the improved performance of the proposed method compared withthe original Plessey detector and the SUSAN detector
this paper provides a theory of infinite streams and objects, which contains our point of view on the problem of formal modelling of behaviors of objects and their systems with big or infinite number of internal state...
详细信息
ISBN:
(纸本)1595933719
this paper provides a theory of infinite streams and objects, which contains our point of view on the problem of formal modelling of behaviors of objects and their systems with big or infinite number of internal states. the most closed analogue of our theory are the theory of finite automata, FOCUS theory of M. Broy and K. Stolen [4] and Reo calculus introduced by F. Arbab and J. Rutten [3] together with its alternative semantics given by constraint finite automata in [2]. In FOCUS objects are described in terms of their input/output behaviors given by sets of stream processing functions. In the coalgebraic semantics of Reo objects are modelled by means of relations on timed data streams. the second semantics of Reo uses constrain finite automata to describe objects. theory of infinite streams and objects differs cardinally: 1) from the automata theory, FOCUS theory and Reo calculus so, that we use infinite streams for modelling of internal variables as well as for inputs and outputs of objects;2 from FOCUS and Reo so, that we work with all involved streams concurrently and synchronously. In our theory we give up the representation of an object through its states and switch to the representation through the sets of all admissible behaviors of interface streams and internal streams constituting the object. this provides our theory of infinite streams and objects greater expressive power than theory of finite automata and moreover than push-down automata the use of streams gives us uniform way for modelling of inputs, outputs and internal variables of objects, simplifies object's definitions, and renders possible our theory to be not afraid of the object's dimensionality increase. A side benefit of the suggested theory is presence of the algorithm for automatic obtaining of the formal model of a system from the given models of objects constituting the system and their topology in the system. We use the theory of universal coalgebras [5] to describe semantics of our th
暂无评论