This paper presents ontlology-based architecture for pattern recognition in the context of static source code analysis. The proposed system has three subsystems: parser, OWL ontologies and analyser. The parser subsyst...
详细信息
ISBN:
(纸本)9783540855620
This paper presents ontlology-based architecture for pattern recognition in the context of static source code analysis. The proposed system has three subsystems: parser, OWL ontologies and analyser. The parser subsystem translates the input coded to AST that is constructed as an XML tree. The OWL ontologies define code patterns and general programming concepts. The analyser subsystem constructs instances of the input code as ontology individuals and asks the reasoner to classify them. The experience gained in the implementation of the proposed system and some practical issues are discussed. The recognition system successfully integrates the knowledge representation field and static code analysis. resulting in greater flexibility of the recognition system.
The focus of this research work is modelling time dependent swelling strain and pressure simultaneously in weak rock. Various swelling potential under different boundary conditions is considered. Free and semiconfined...
详细信息
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially increasing the secret key rate and distance that can be covered by QKD protocols with practical signals. The security a...
详细信息
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially increasing the secret key rate and distance that can be covered by QKD protocols with practical signals. The security analysis of these schemes, however, leaves open the possibility that the development of better proof techniques or better classical postprocessing methods might further improve their performance in realistic scenarios. In this paper, we derive upper bounds on the secure key rate for decoy-state QKD. These bounds are based basically only on the classical correlations established by the legitimate users during the quantum communication phase of the protocol. The only assumption about the possible postprocessing methods is that double click events are randomly assigned to single click events. Further, we consider only secure key rates based on the uncalibrated device scenario which assigns imperfections such as detection inefficiency to the eavesdropper. Our analysis relies on two preconditions for secure two-way and one-way QKD. The legitimate users need to prove that there exists no separable state (in the case of two-way QKD) or that there exists no quantum state having a symmetric extension (one-way QKD) that is compatible with the available measurements results. Both criteria have been previously applied to evaluate single-photon implementations of QKD. Here we use them to investigate a realistic source of weak coherent pulses. The resulting upper bounds can be formulated as a convex optimization problem known as a semidefinite program which can be efficiently solved. For the standard four-state QKD protocol, they are quite close to known lower bounds, thus showing that there are clear limits to the further improvement of classical postprocessing techniques in decoy-state QKD.
Testable second moment stability conditions for discrete-time supervisory control systems were recently developed using the Hybrid Jump Linear Systems (HJLS's) framework. These tests are extended here to sampled-d...
详细信息
Motion estimation is one of the most important tasks for autonomous mobile robots. Modern mobile robots are equipped with different types of visual sensors that can provide wide ranges of outputs which can be used as ...
详细信息
ISBN:
(纸本)9781424442355
Motion estimation is one of the most important tasks for autonomous mobile robots. Modern mobile robots are equipped with different types of visual sensors that can provide wide ranges of outputs which can be used as reliable inputs for the computing of the robots displacement. One of the widely used visual sensors on mobile robots is the stereo camera due to its simplicity and availability. However, the recently invented Photonic Mixer Device (PMD) that uses the time of flight principle, also becomes more and more popular because of its robustness against ambient light and weak textured surfaces. This paper introduces the compared results of the motion estimation using two different types of 3D sensors (stereo and PMD) and also suggests a new approach to fuse their data in order to improve the calculation accuracy. An experiment was conducted using a mobile robot where the motion of the robot was evaluated using a least square technique. The results from each sensor were obtained and compared to prove their capability toward the motion estimation task.
In this paper, the property of practical input-to-state stability and its application to stability of cascaded nonlinear systems are investigated in the stochastic framework. Firstly, the notion of (practical) stoch...
详细信息
In this paper, the property of practical input-to-state stability and its application to stability of cascaded nonlinear systems are investigated in the stochastic framework. Firstly, the notion of (practical) stochastic input-to-state stability with respect to a stochastic input is introduced, and then by the method of changing supply functions, (a) an (practical) SISS-Lyapunov function for the overall system is obtained from the corresponding Lyapunov functions for cascaded (practical) SISS subsystems.
This paper investigates how we can work towards building net-centric swarms of land, sea and air robots working together to accomplish a common goal. The goal is to bring together swarms of robots from all three secto...
详细信息
We consider a setting where mobile nodes with sensing capacity form a network whose mission is to collect measurements for parameter estimation of a distributed parameter system (DPS). Two techniques to optimize node ...
We consider a setting where mobile nodes with sensing capacity form a network whose mission is to collect measurements for parameter estimation of a distributed parameter system (DPS). Two techniques to optimize node motions are presented which constitute a trade-off between the achievable accuracy of parameter estimates and limited motion resources of sensor network nodes. The framework is based on the use of the D-optimality criterion defined on the Fisher information matrix associated with the estimated parameters as a measure of the information content in the measurements. Restrictions on maximal distances traveled by sensor nodes are imposed so as to guarantee realizable solutions. The approach is to convert the problem to a canonical optimal control one in Mayer form, in which both the control forces of the sensors and the initial sensor positions are optimized. Numerical solutions are then obtained using the M atlab PDE toolbox and the RIOTS_95 optimal control toolbox which handles various constraints imposed on the node motions. Illustrative numerical experiments with the proposed techniques are presented.
A family of hybrid control algorithms is developed that steer a nonholonomic autonomous vehicle to the source of a scalar signal present in the environment. In an idealized setting, we develop a general hybrid control...
详细信息
ISBN:
(纸本)9781424431236
A family of hybrid control algorithms is developed that steer a nonholonomic autonomous vehicle to the source of a scalar signal present in the environment. In an idealized setting, we develop a general hybrid control scheme that globally asymptotically stabilizes the vehicle position about the source. Pursuing a practical implementation, a series of perturbations to the family of controllers is introduced, resulting in a semi-global practical stability of the vehicle position about the source. An example of a recently developed conjugate direction-based controller fitting into this family is developed and demonstrated by simulation and experiment.
Most modern digital signal processors (DSPs) provide multiple address registers and a dedicated address generation unit (AGU) which performs address generation in parallel to instruction execution. There is no address...
详细信息
Most modern digital signal processors (DSPs) provide multiple address registers and a dedicated address generation unit (AGU) which performs address generation in parallel to instruction execution. There is no address computation overhead if the next address is within the auto-modify range. A careful placement of variables in memory is utilized to decrease the number of address arithmetic instructions and thus to generate compact and efficient code. The simple offset assignment (SOA) problem concerns the layout of variables for machines with one address register and the general offset assignment (GOA) deals with multiple address registers. Both these problems assume that each variable needs to be allocated for the entire duration of a program. Both SOA and GOA are NP-complete. In this paper, we present an effective heuristic for the general offset assignment problem with variable coalescing (CGOA) where two or more non-interfering variables can be mapped into the same memory location. Results on several benchmarks show the significant improvement of our solution compared to other heuristics. Results were further improved using a simulated annealing (SA).
暂无评论