It is widely recommended by both academia and industry that today's technology and softwareengineering students be well prepared for industry before graduation, especially given global outsourcing and other trend...
详细信息
A spiral antenna operating at 24 GHz designed for scientific and medical (ISM) band is reported. The procedure is fully compatible with standard CMOS fabrication process. The fabrication has been achieved on silicon s...
详细信息
ISBN:
(纸本)9781424449996
A spiral antenna operating at 24 GHz designed for scientific and medical (ISM) band is reported. The procedure is fully compatible with standard CMOS fabrication process. The fabrication has been achieved on silicon substrates using a bulk micromachining technique. To improve the radiation efficiency and to minimize transmission loss, a silicon-based membrane has been employed on silicon substrates. To optimize the occupied area of the antenna a square spiral structure is selected rather than the circular one. The simulation results show a good matching and wide bandwidth operation of the spiral antenna.
In previous work, we presented several distributional approaches to anomaly detection for a speech activity detector by training a model on purely nominal data and estimating the divergence between it and other input....
详细信息
In previous work, we presented several distributional approaches to anomaly detection for a speech activity detector by training a model on purely nominal data and estimating the divergence between it and other input. Here, we reformulate the problem in an unsupervised framework and allow for anomalous contamination of the training data. After noting the instability of Gaussian mixture models (GMMs) in this context, we focus on non-parametric methods using regularly binned histograms. While the performance of the log likelihood baseline suffered as the amount of contamination was increased, many of the distributional approaches were not affected. We found that the L 1 distance, chi 2 statistic, and information theory divergences consistently outperformed the other methods for a variety of contamination levels and test segment lengths.
We present a general mathematical description of the top-down attention control problem. Three important components are identified in the model: context extraction, attention focus and decision making. The context giv...
详细信息
ISBN:
(纸本)9781424448081
We present a general mathematical description of the top-down attention control problem. Three important components are identified in the model: context extraction, attention focus and decision making. The context gives a coarse blurry representation of the whole input; the attention module models the focus of attention on a limited part of input, and the decision making component accounts the final decision of the agent for its motory actions. In order to achieve a faster convergence of attention learning in the online phase, an offline optimization step is performed in advance. To do so, we incorporate the knowledge of a full observer agent that has approximately learned the optimal decision making of the task. The simulation results show that by employing our algorithm, the learning speed is improved.
Designing an appropriate cooperation protocol in multi-robot systems such as multi-robot object manipulation systems is a challenging task. In this paper designing and implementing a cooperation protocol between two r...
详细信息
Designing an appropriate cooperation protocol in multi-robot systems such as multi-robot object manipulation systems is a challenging task. In this paper designing and implementing a cooperation protocol between two robots pushing an object toward an arbitrary goal configuration is investigated. The proposed method benefits from task decoupling which simplifies the cooperation protocol design. Each robot gets its proper action from a particular fuzzy inference system independently. The fuzzy controllers outputs are low-level robot commands by which the need to a robot path planning algorithm is eliminated. Simulation results show that robots could push the object to the goal configuration cooperatively. Experiments have been conducted to approve the proposed system.
In this paper, we develop a method for computing the inverse of a rational or polynomial matrix via Wolovich's Structure Theorem. By using Leverrier's algorithm with the above result, the inverse can be obtain...
详细信息
In this paper, we develop a method for computing the inverse of a rational or polynomial matrix via Wolovich's Structure Theorem. By using Leverrier's algorithm with the above result, the inverse can be obtained using only arithmetic operations.
In this paper, we present an efficient technique for mapping a set of IP-cores onto tiles of a network-on-chip (NoC). Our constraints are power dissipation, communication bandwidth, and routing resources. To evaluate ...
详细信息
ISBN:
(纸本)9781424457489
In this paper, we present an efficient technique for mapping a set of IP-cores onto tiles of a network-on-chip (NoC). Our constraints are power dissipation, communication bandwidth, and routing resources. To evaluate the proposed scheme, the technique has been applied to some real applications and random task graphs with different sizes of mesh topologies. The results of the mapping technique are compared with schemes based on the genetic algorithm, EPAM technique, and random mapping. The comparison shows that the extra communication power consumptions compared to an ideal mapping are up to 20% and 86% less compared to those of the genetic algorithm and random mapping for real applications. The extra power consumptions are about the same when compared to those of the EPAM scheme. In general, the runtime of the proposed algorithm is considerably lower than those of GA and EPAM techniques for large NoCs, making the technique an efficient mapping scheme.
作者:
Yingxu WangInternational Center of Cognitive Informatics (ICteI)
Theoretical and Empirical Software Engineering Research Centre (TESERC) Department of Electrical and Computer Engineering Schulich School of Engineering University of Calgary Calgary AB Canada
Cognitive computing (CC) is an emerging paradigm of intelligent computing methodologies and systems that implements computational intelligence by autonomous inferences and perceptions mimicking the mechanisms of the b...
详细信息
Cognitive computing (CC) is an emerging paradigm of intelligent computing methodologies and systems that implements computational intelligence by autonomous inferences and perceptions mimicking the mechanisms of the brain [1, 3, 4, 5, 6, 12, 13, 15, 16, 18, 20, 22, 23]. CC is emerged and developed based on the transdisciplinary research in cognitive informatics and abstract intelligence. Cognitive informatics (CI) is a transdisciplinary enquiry of computer science, information science, cognitive science, and intelligence science that investigates into the internal information processing mechanisms and processes of the brain and natural intelligence, as well as their engineering applications [1, 3, 6, 12, 13, 20, 22]. The theoretical framework of cognitive informatics [6] covers the Information-Matter-Energy (IME) model [5], the Layered Reference Model of the Brain (LRMB) [19], the Object-Attribute-Relation (OAR) model of information representation in the brain [7], the cognitive informatics model of the brain [17], Natural Intelligence (NI) [6], and neuroinformatics [6]. Recent studies on LRMB in cognitive informatics reveal an entire set of cognitive functions of the brain and their cognitive process models, which explain the functional mechanisms and cognitive processes of the natural intelligence with 43 cognitive processes at seven layers known as the sensation, memory, perception, action, meta-cognitive, meta-inference, and higher cognitive layers from the bottom up [19].
With the proliferation of new online services and wireless personal devices, location-based services and applications for mobile users are widespread in use today. But the privacy of these users exposes to others incr...
详细信息
With the proliferation of new online services and wireless personal devices, location-based services and applications for mobile users are widespread in use today. But the privacy of these users exposes to others increasingly in accessing those location based services. Exposure of the location information may result in privacy threat by malicious servers and hackers. In this paper, we propose a new framework that mobile users can enjoy conveniently the services provided by location-based server (LBS), and also protect their location information. This framework prevents mobile users' location information from exposing in two ways: providing the server with fake identities; two different ways of diffusing a number of fake queries with the real query hidden when and where it was issued.
In this paper, a modern intelligent control based on computational model of mammalian limbic system and emotional processes (BELBIC) is presented for speed and flux control of induction motor simultaneously. In this w...
详细信息
In this paper, a modern intelligent control based on computational model of mammalian limbic system and emotional processes (BELBIC) is presented for speed and flux control of induction motor simultaneously. In this work, a novel and simple model of induction motor drives control plant is achieved by using the intelligent control system, which controls motor speed and flux accurately, without needing to using any conventional controllers and also, quite independent of motor parameters. This generation of intelligent controllers that has high auto learning speed with simple structure shows excellent praxis for industrial scale utilization truly.
暂无评论