The authors propose a coordinate rotation digital computer (CORDIC) rotator algorithm that eliminates the problems of scale factor compensation and limited range of convergence associated with the classical CORDIC alg...
详细信息
The authors propose a coordinate rotation digital computer (CORDIC) rotator algorithm that eliminates the problems of scale factor compensation and limited range of convergence associated with the classical CORDIC algorithm. In the proposed scheme, depending on the target angle or the initial coordinate of the vector, a scaling by 1 or 1/root2 is needed that can be realised with minimal hardware. The proposed CORDIC rotator adaptively selects the appropriate iteration steps and converges to the final result by executing on average only 50% of the number of iterations required by the classical CORDIC. Unlike for the classical CORDIC, the value of the scale factor is completely independent of the number of executed iterations. Based on the proposed algorithm, a 16-bit pipelined CORDIC rotator was implemented. The silicon area of the fabricated pipelined CORDIC rotator core is 2.73 mm(2). This is equivalent to 38 000 inverter gates in the used 0.25 mum BiCMOS technology. The average dynamic power consumption of the fabricated CORDIC rotator is 17 mW at a 2.5 V supply voltage and a 20 Ms/s throughput. Currently, this CORDIC rotator is used as a part of the baseband processor for a project that aims to design a single-chip wireless modem compliant with the IEEE 802.11a standard.
Consideration was given to the optimization model of assigning the locomotives to the freight trains. The model was formulated in terms of a dynamic problem of stochastic programming with probabilistic constraints. Th...
详细信息
Consideration was given to the optimization model of assigning the locomotives to the freight trains. The model was formulated in terms of a dynamic problem of stochastic programming with probabilistic constraints. The state variables characterize positions of the locomotives and trains at each time instant. The variables defining the motion of locomotives and their assignment to trains at each time instant play the role of controls. The expectation of the total freight traffic is the criterial function of the problem. A two-stage hybrid algorithm to solve the problem was developed. It combines the coordinatewise search and a genetic algorithm. Results of the numerical experiment were given.
Extreme learning machine (ELM) has been extensively studied in machine learning community during the last few decades due to its high efficiency and the unification of classification, regression, and so forth. Though ...
详细信息
Extreme learning machine (ELM) has been extensively studied in machine learning community during the last few decades due to its high efficiency and the unification of classification, regression, and so forth. Though bearing such merits, existing ELM algorithms cannot efficiently handle the issue of missing data, which is relatively common in practical applications. The problem of missing data is commonly handled by imputation (i.e., replacing missing values with substituted values according to available information). However, imputation methods are not always effective. In this paper, we propose a sample-based learning framework to address this issue. Based on this framework, we develop two sample-based ELM algorithms for classification and regression, respectively. Comprehensive experiments have been conducted in synthetic data sets, UCI benchmark data sets, and a real world fingerprint image data set. As indicated, without introducing extra computational complexity, the proposed algorithms do more accurate and stable learning than other state-of-the-art ones, especially in the case of higher missing ratio.
Free theorems establish interesting properties of parametrically polymorphic functions, solely from their types, and serve as a nice proof tool. For pure and lazy functional programming languages, they can be used wit...
详细信息
Free theorems establish interesting properties of parametrically polymorphic functions, solely from their types, and serve as a nice proof tool. For pure and lazy functional programming languages, they can be used with very few preconditions. Unfortunately, in the presence of selective strictness, as provided in languages like Haskell, their original strength is reduced. In this paper we present an approach for overcoming this weakness in specific situations. Employing a refined type system which tracks the use of enforced strict evaluation, we rule out unnecessary restrictions that otherwise emerge. Additionally, we provide (and implement) an algorithm determining all refined types for a given term.
Reverse engineering (RE) is the process of digitally capturing physical entities of an existing part from its scanned data. A novel methodology is proposed for reconstruction of CAD models by recognizing prismatic fea...
详细信息
Reverse engineering (RE) is the process of digitally capturing physical entities of an existing part from its scanned data. A novel methodology is proposed for reconstruction of CAD models by recognizing prismatic features from a data set of three-dimensional scanned points, which utilizes the concepts of artificial neural networks (ANNs). Four geometric attributes, such as chain code, convex/concave, circular/rectangular, and open/closed attribute, are extracted from a scanned point set first, and then they are presented to the ANN module for feature recognition. Each generic feature in the feature library is uniquely described by those geometric attributes. Identifying each feature requires the determination of these attributes beforehand. Once these attributes are determined, a segmented point set may be uniquely identified as a valid feature through the ANN module. Since feature recognition is carried out based on these attributes, this paper focuses on algorithms for determining these attributes directly from a scanned point set. The system validation and sample results are also discussed.
A thorough analysis of a new scalar control method for the operation of direct frequency changers using bidirectional switches operating at high switching frequencies is proposed. The method uses the instantaneous vol...
详细信息
A thorough analysis of a new scalar control method for the operation of direct frequency changers using bidirectional switches operating at high switching frequencies is proposed. The method uses the instantaneous voltage ratio of specific input phase voltages to generate the active and zero states of the various switches. A voltage transfer ratio as high as 0.87 is obtained under synchronous and asynchronous operation with a conventionally connected three phase load. Moreover, the converter operation can be set to produce almost any power displacement factor, independent of load power factor.
We propose a new collaborative neighbor representation algorithm for face recognition based on a revised regularized reconstruction error (RRRE), called the two-phase collaborative neighbor representation algorithm (T...
详细信息
We propose a new collaborative neighbor representation algorithm for face recognition based on a revised regularized reconstruction error (RRRE), called the two-phase collaborative neighbor representation algorithm (TCNR). Specifically, the RRRE is the division of l(2)-norm of reconstruction error of each class into a linear combination of l(2)-norm of reconstruction coefficients of each class, which can be used to increase the discrimination information for classification. The algorithmis as follows: in the first phase, the test sample is represented as a linear combination of all the training samples by incorporating the neighbor information into the objective function. In the second phase, we use the.. classes to represent the test sample and calculate the collaborative neighbor representation coefficients. TCNR not only can preserve locality and similarity information of sparse coding but also can eliminate the side effect on the classification decision of the class that is far from the test sample. Moreover, the rationale and alternative scheme of TCNR are given. The experimental results show that TCNR algorithm achieves better performance than seven previous algorithms.
Modern network intrusion detection systems must be able to handle large and fast changing data, often also taking into account real-time requirements. Ensemble-based data mining algorithms and their distributed implem...
详细信息
Modern network intrusion detection systems must be able to handle large and fast changing data, often also taking into account real-time requirements. Ensemble-based data mining algorithms and their distributed implementations are a promising approach to these issues. Therefore, this work presents the current state of the art of the ensemble-based methods used in modern intrusion detection systems, with a particular attention to distributed approaches and implementations. This review also consider supervised and unsupervised data mining algorithms, more suitable to work in an environment that requires the analysis of data streams in real-time. Sharing knowledge across multiple nodes is another of the key points in designing appropriate NIDSs and for this reason, collaborative IDS were also included in this work. Finally, we discuss some open issues and lessons learned from this review, which can help researchers to design more efficient NIDSs. (C) 2016 Elsevier Ltd. All rights reserved.
This study considers joint pricing and lot-sizing policies in a single-manufacturer-single-retailer system. Because a supply chain is a hierarchical system, we adopt a bilevel programming technique to establish a bile...
详细信息
This study considers joint pricing and lot-sizing policies in a single-manufacturer-single-retailer system. Because a supply chain is a hierarchical system, we adopt a bilevel programming technique to establish a bilevel joint pricing and lot-sizing model guided by the manufacturer. The objective of the problem here is to respectively maximize the manufacturer's and the retailer's net profits by determining the manufacturer's and retailer's lot size, the wholesale price and the retail price simultaneously. Following the properties of the bilevel programming problem (BLPP), we design a novel bilevel particle swarm optimization algorithm (BPSO), and it can solve BLPP without any assumed conditions of the problem. BPSO shows a good performance on eight benchmark bilevel problems. Then BPSO is employed to solve the proposed bilevel model, and the experimental data are used to analyze the features of the proposed bilevel model, and the results support the finding that BPSO is effective in optimizing BLPP.
Packet-level measurement is now critical to many aspects of broadband networking, for example for guaranteeing service level agreements, facilitating measurement-based admission control algorithms and performing netwo...
详细信息
Packet-level measurement is now critical to many aspects of broadband networking, for example for guaranteeing service level agreements, facilitating measurement-based admission control algorithms and performing network tomography. Because it is often impossible to measure all the data passing across a network, the most widely used method of measurement works by injecting probe packets. The probes provide samples of the packet loss and delay, and from these samples the loss and delay performance of the traffic as a whole can be deduced. However, measuring performance like this is prone to errors. Recent work has shown that some of these errors are minimised by using a gamma renewal process as the optimal pattern for the time instants at which to inject probes. This leaves the best rate at which to inject probes as the key unsolved problem, and this is addressed here by using the statistical principles of the design of experiments. The experimental design approach allows one to treat packet-level measurements as numerical experiments that can be designed optimally. Modelling the overflow of buffers as a 2-state Markov chain, the system's likelihood function is deduced, and from this a technique ( using the Fisher information matrix) to determine the upper-bound on the optimal rate of probing is developed. A generalisation of this method accounts for the effect of the probed observations interfering with the experiment. The numerical results focus on VoIP traffic, allowing one to show how this methodology would be used in practice. One application of this is in measurement-based admission control algorithms, where the technique can be used to provide an upper-bound on the rate at which probes should be injected to monitor the loss performance of the target network, prior to making an admit/do not admit decision.
暂无评论