In this paper, we consider iterative detection in combination with an outer low-density parity-check (LDPC) code, and present new EXIT curves that help to optimize the decoding schedule among these blocks. For this, w...
详细信息
this conference proceedings contains 30 papers, of which 1 is given in abstract form only. the topics covered are: protocols;heterogeneous computer networks;societal issues;modeling, analysis, and optimization;local c...
详细信息
this conference proceedings contains 30 papers, of which 1 is given in abstract form only. the topics covered are: protocols;heterogeneous computer networks;societal issues;modeling, analysis, and optimization;local computer networks;networks, systems, and architecture;internetworking;and satellite networks. Technical and professional papers from this conference are indexed withthe conference code no. 00647 in the Ei Engineering Meetings (TM) database produced by Engineering Information, Inc.
the paper focuses on the control design of LPV and qLPV models via TS fuzzy model representation and Linear Matrix Inequality (LMI) based design under the Parallel Distributed Compensation control design framework. th...
详细信息
ISBN:
(纸本)9781424438013
the paper focuses on the control design of LPV and qLPV models via TS fuzzy model representation and Linear Matrix Inequality (LMI) based design under the Parallel Distributed Compensation control design framework. the related literature reports considerable research on how to manipulate with LMI's to achieve better control performance. this paper shows that this effort is not enough, the optimization of the control performance must include the convex hull manipulation on the TS fuzzy model beside manipulating withthe LMIs. the LMI's guaranty the optimal solution for a given convex hull, but the convex bull representation is not invariant. Furthermore, the solutions by LMI's are very sensitive for the convex hull. the paper proposes a systematic concept for various convex hull manipulation method.
the proceedings contains 28 papers on high level synthesis. Topics discussed include the following: electric network synthesis, computer architecture, computer hardware description languages, scheduling, computer syst...
详细信息
ISBN:
(纸本)0818657855
the proceedings contains 28 papers on high level synthesis. Topics discussed include the following: electric network synthesis, computer architecture, computer hardware description languages, scheduling, computer systems, program compilers, circuit testing, storage allocation, verification, codegeneration, VLSI circuits and systems, computer interfaces, critical path analysis, algorithms and the mathematical models used in calculations.
the proceedings contain 9 papers. the topics discussed include: test generation across multiple layers;search-based security testing of web applications;root cause analysis for HTML presentation failures using search-...
ISBN:
(纸本)9781450328524
the proceedings contain 9 papers. the topics discussed include: test generation across multiple layers;search-based security testing of web applications;root cause analysis for HTML presentation failures using search-based techniques;moving the goalposts: coverage satisfaction is not enough;code hunt: searching for secret code for fun;an overview of search based combinatorial testing∗;model based test case generation with metaheuristics for networks of timed automata;search based techniques for software fault prediction: current trends and future directions;and a hybrid test optimization framework using memetic algorithm with cuckoo flocking based search approach.
the proceedings contain 169 papers. the topics discussed include: text-guided image generation based on ternary attention mechanism generative adversarial network;design of a quadrotor UAV controller based on body sen...
ISBN:
(纸本)9798350363173
the proceedings contain 169 papers. the topics discussed include: text-guided image generation based on ternary attention mechanism generative adversarial network;design of a quadrotor UAV controller based on body sensing control;an adaptive graph neural networks based on cost-sensitive learning for fraud detection;implementation of DWA optimization algorithm in automatic inspection of switching robot;a life cycle management architecture for power equipment based on device fingerprinting;parameter self-tuning of vector control for permanent magnet synchronous motor based on IGAHF;and efficient-learning grasping and pushing in dense stacking via mask function and pixel overlap rate.
Enterprise JavaBean (hereafter EJB) technology has been widely adopted in software industry to develop Web information systems. However, most of EJB applications are reengineered from legacy database applications. thi...
详细信息
this paper proposes a concept of artificial intelligence architecture which would be usable in various kind of problems. Artificial intelligences are used in many areas of computer science for decision making tasks. T...
详细信息
ISBN:
(纸本)9781479959556
this paper proposes a concept of artificial intelligence architecture which would be usable in various kind of problems. Artificial intelligences are used in many areas of computer science for decision making tasks. Traditionally each artificial intelligence is designed and programmed to be used within a particular software and for a specific purpose. However, this paper stands as the first step of research in progress whose final objective is to create an artificial intelligence adaptable to all kinds of problems without any change in its source code. the present proposition focuses on the architecture of that artificial intelligence and is introduced in the context of video games. this architecture, composed of three layers, would be re-usable for all types of game.
An advantage of CDMA-based protocols is that packets can be transmitted immediately without prior channel access or resource reservation. In this paper however we propose to incorporate a reservation mechanism into CD...
详细信息
ISBN:
(纸本)0769516718
An advantage of CDMA-based protocols is that packets can be transmitted immediately without prior channel access or resource reservation. In this paper however we propose to incorporate a reservation mechanism into CDMA-based protocols for next-generation wireless networks with data, voice, and multimedia applications. the resultant paradigm is called code division multiple access with adaptable reservation (CDMA/AR). the motivations for this change include that QoS guarantees can continue to be provisioned in CDMA/AR-based systems even when man), handoff mobile stations enter an already heavily utilized cell. Our simulation results and mathematical analysis show that the adaptable reservation and differentiated admission control mechanisms of CDMA/AR can considerably reduce the handoff-rejection and call-blocking rates for higher-priority traffic to very small values, while achieving throughput close to 100% at the same time..
this paper presents an efficient graph-based evolutionary optimization technique called Evolutionary Graph generation (EGG) and its extension to a parallel version. A new version of parallel EGG system is based on a c...
详细信息
this paper presents an efficient graph-based evolutionary optimization technique called Evolutionary Graph generation (EGG) and its extension to a parallel version. A new version of parallel EGG system is based on a coarse-grained model of parallel processing and can synthesize heterogeneous networks of various different components efficiently. the potential capability of parallel EGG system is demonstrated through the design of current-mode logic circuits.
暂无评论