This paper proposes advanced key performance indicators dedicated to learning machines and auto-adaptive systems performance analysis. This work introduces an algorithm implementing designed key performance indicators...
详细信息
This paper proposes advanced key performance indicators dedicated to learning machines and auto-adaptive systems performance analysis. This work introduces an algorithm implementing designed key performance indicators for automatic learning capacity checking. The algorithm simulates the supervised environment to stimulate the tested auto-adaptive machine and then study its adaption capacity based on indicators statistically designed.
For miniaturized multi-gas sensors, the detected multi-gas signals would be self-interfered by responses to multiple gases. In this paper, a fast Independent Component analysis (FICA) is proposed to restore the origin...
详细信息
ISBN:
(纸本)9781479962761
For miniaturized multi-gas sensors, the detected multi-gas signals would be self-interfered by responses to multiple gases. In this paper, a fast Independent Component analysis (FICA) is proposed to restore the original source signals from the mixed signals received by different gas sensors. This FICA is designed and implemented by low power algorithm-architecture co-design considering the tradeoffs among power, delay and accuracy of extracted signals for multi-gas sensor applications. To further reduce the power consumption, a data-length controller is designed to adjust the calculated data-length. Additionally, a stability check unit is utilized to terminate the ICA execution for reduction of the computation time and total energy. Compared with the conventional ICA design, the proposed low-power FICA realizes energy reduction by 75% for multi-gas sensor applications.
AES algorithm is a new generation of the data encryption standard. With its strong security, high-performance and high efficiency, AES can meet the requirements of accounting information security. In this paper, start...
详细信息
AES algorithm is a new generation of the data encryption standard. With its strong security, high-performance and high efficiency, AES can meet the requirements of accounting information security. In this paper, started with the threats of accounting information, using the AES encryption algorithm to solve the security problems of accounting information in the storage, information transmission, security subsystem and the establishment of an independent accounting system, and designing the overall structure of accounting information security system based on AES algorithm.
In modern society, power quality problem has become an important problem, which effects industrial production and product quality, etc. So, we need to monitor and analyze electric power parameter to assure electric po...
详细信息
ISBN:
(纸本)9781424442232
In modern society, power quality problem has become an important problem, which effects industrial production and product quality, etc. So, we need to monitor and analyze electric power parameter to assure electric power quality in prescribed limit. Aiming to disadvantages of present electric parameter detection of power harmonic, we design a kind of wireless power electric parameter detection system based on single chip microprocessor (SCM) technology, wireless communication technology, FFT, wavelet resolution analysis, and visual instrument (VI) technology, etc. System is composed of upper PC and lower PC. Lower PC uses transformer module, signal processor module to realize electric power signal conversion, which can be recognized by MSP430F149. Lower PC controls nRF905 wireless transceiver module to realize signal transmitting between lower PC and upper PC installing of VI software of LabVIEW. System software combines FFT and wavelet analysis method to realize electric power parameter of harmonic analysis, which solves shortcoming of single FFT analysis. Through simulation experiment, method of combining FFT with wavelet transform is verified to be accurate.
A low bit rate coding speech algorithm is introduced in this paper. This algorithm can make the bit rate lower than MBE under good speech quality, and its bit rate can reach to 2kbps. Meanwhile we discuss the chip des...
详细信息
ISBN:
(纸本)1424401607
A low bit rate coding speech algorithm is introduced in this paper. This algorithm can make the bit rate lower than MBE under good speech quality, and its bit rate can reach to 2kbps. Meanwhile we discuss the chip design based on this algorithm, analyzing the process of designing speech chip using Motorola C_CORE. Finally we describe the principle of this coding algorithm and explain the difference between this algorithm with others.
SOC (Security Operation Center) is the core platform of safety management system, and correlation analysis engine is the core of SOC. This paper designs a correlation analysis engine model. The engine can not only eff...
详细信息
SOC (Security Operation Center) is the core platform of safety management system, and correlation analysis engine is the core of SOC. This paper designs a correlation analysis engine model. The engine can not only effectively eliminate or reduce duplicate and redundant alerts, but also quickly discover the hidden attack tactics in the huge amount of alerts generated by multi-step attacks. Based on the engine, Carma_VE algorithm is presented in order to automatically generate association rules. Compared with the Carma algorithm, Carma_VE algorithm is more efficient under the smaller training set.
A synchronous checkpointing algorithm coordinates a set of processes in taking checkpoints in such a way that the set of local checkpoints always forms part of a consistent global system state. Whenever a process p re...
详细信息
ISBN:
(纸本)0818678763
A synchronous checkpointing algorithm coordinates a set of processes in taking checkpoints in such a way that the set of local checkpoints always forms part of a consistent global system state. Whenever a process p requests to take a checkpoint, a set of processes, called the cohorts set of p, must be checked and some of them may also have to take their checkpoints in order to preserve system consistency. Although several synchronous checkpointing algorithms have been proposed in the literature, most of them do not address the performance issue. In this paper we propose an efficient distributed algorithm for synchronous checkpointing. Proof of correctness and analysis of efficiency of the algorithm are presented. It is shown that the algorithm has a better message and time complexity than the existing algorithms. The method proposed in this paper can also be applied to enhance the performance of rollback operation which always require synchronization of the inter-dependent processes.
A number of the noise cancellation applications of the (LMS) algorithm involve systems where the input or the output of the adaptive filter or the feedback error signal are linearly filtered prior to use in the adapti...
详细信息
A number of the noise cancellation applications of the (LMS) algorithm involve systems where the input or the output of the adaptive filter or the feedback error signal are linearly filtered prior to use in the adaptive algorithm. These systems will be denoted ''filtered'' LMS. In this paper, a frequency domain model of the ''filtered'' LMS algorithm is presented for analyzing the behavior of the weights during adaptation. In particular, expressions for stable operation of the algorithm are derived as a function of the algorithm step size mu, the input signal power, and the transfer functions of the linear filters. The expressions show that algorithm stability can be achieved over a frequency band of interest by inserting an appropriately chosen delay in the reference input to the LMS algorithm weight update equation. This result implies that it is not necessary to use a training mode to estimate the loop transfer functions before or during adaptation if the input is limited to a band of frequencies. It is only necessary to know the approximate delay introduced by the transfer functions in the band. The single delay parameter can be estimated much more easily than the entire transfer function. Simulations of the time domain algorithm are presented which support the theoretical predictions of the frequency domain model. In particular, the simulations display stability behavior as predicted by the theory and show significant reductions in the error power.
The architecture of CONEX-expert system for control system design and analysis-is presented. The important features of CONEX are discussed and they include: a structured organization of the short-term database, a clus...
详细信息
The architecture of CONEX-expert system for control system design and analysis-is presented. The important features of CONEX are discussed and they include: a structured organization of the short-term database, a clustering criteria for partitioning the rule-base into connected rule-spaces, a language for representing the domain-specific rules, and an inference engine that can adopt different search strategies for different rule-spaces. Additionally, an explanation generation module gives CONEX the attribute of user friendliness.< >
A CAD tool employing the finite-difference time-domain (FDTD) algorithm is developed for the design and analysis of optical waveguide structures. The basic formulation of the algorithm is given, and practical conditio...
详细信息
A CAD tool employing the finite-difference time-domain (FDTD) algorithm is developed for the design and analysis of optical waveguide structures. The basic formulation of the algorithm is given, and practical conditions for its application are briefly outlined. The accuracy of the numerical scheme is investigated through a study of a canonical parallel-slabs coupling structure. Both the coupling length and the field distribution are in good agreement with results in the literature. The use of the method is illustrated by an analysis of a directional coupler.< >
暂无评论