The performance of a CMOS circuit depends heavily on its transistor sizes. We have tested a standard optimizer, a Monte Carlo scheme and a method based on Genetic Algorithms combined with very accurate SPICE simulatio...
详细信息
The aim of the work was to develop a procedure that allows prosodic modifications of speech signals without impairing the quality. The developed procedure is based on the Fourier analysis/synthesis technique with seve...
详细信息
The aim of the work was to develop a procedure that allows prosodic modifications of speech signals without impairing the quality. The developed procedure is based on the Fourier analysis/synthesis technique with several improvements on the analysis side, such as the analysis of signals with rapidly changing F/sub 0/ and the analysis of weak spectral components. Also for the modification of the short time spectrum and for the reconstruction of the speech signal some new methods have been introduced. The most important one, in terms of speech quality, is the method of phase compensation that limits the absolute time shift to half the pitch period. The developed procedure is used in our high quality text to speech synthesis system that is based on concatenation of prosodically modified diphones.
In this paper, we present the design and implementation of the BETEUS (Broadband Exchange for Trans-European Usage) communication and application platform. BETEUS is a European project aiming at developing generic, st...
详细信息
We consider two mechanisms by which call setup requests are blocked in a mobile communication system: (1) The calling party may get impatient while the system is looking for the mobile unit and hang up. (2) There may ...
详细信息
We consider two mechanisms by which call setup requests are blocked in a mobile communication system: (1) The calling party may get impatient while the system is looking for the mobile unit and hang up. (2) There may be no channel available for call setup. These two blocking events can be combined to obtain a single request loss probability. For different arrival rates, number of cells in the paging area, impatience threshold, and number of voice channels available, we find the minimum paging rate required to meet some maximum loss probability criterion. We thus indirectly find the minimum paging bandwidth necessary to support a given number of voice channels.
A new algorithm is presented for the joint estimation of linear and nonlinear parameters of a deterministic signal embedded in additive Gaussian noise. The algorithm is a modification of the reduced sufficient statist...
详细信息
A new algorithm is presented for the joint estimation of linear and nonlinear parameters of a deterministic signal embedded in additive Gaussian noise. The algorithm is a modification of the reduced sufficient statistics (RSS) method introduced by Kulhavy (1990), which estimates the posterior parameter density via minimization of the cross-entropy. In the additive Gaussian noise measurement model, the modified RSS algorithm employs a parallel bank of least-squares type estimators for the linear parameters, coupled with an approximate minimum variance estimate for the nonlinear parameter. Simulation results are presented for the problem of estimating parameters of a chirp signal embedded in multipath, and the averaged squared error (ASE) of the parameter estimates is compared with the Cramer-Rao bound.
Mandayam and Boltzman (see MILCOM'95, San Diego, California, 1995) studied an access protocol for short data messages in an integrated voice/data CDMA system. It was assumed that voice traffic had priority and was...
详细信息
Mandayam and Boltzman (see MILCOM'95, San Diego, California, 1995) studied an access protocol for short data messages in an integrated voice/data CDMA system. It was assumed that voice traffic had priority and was less tolerant to delay than data traffic. Hence, the transmission of data traffic could be controlled to guarantee acceptable quality of service for voice. The data messages were of short duration and as a result, closed loop power control for them was not possible. The access protocol considered was an extension of a proposal by Viterbi (see Communications & Cryptography, p.42, 1994), which was for data-only systems. A slotted system was considered for data. At the end of every slot, the base station would control the transmission of data users by increasing/decreasing data permission probability. Measured QoS for voice was the criterion. An approximate model wherein a one-dimensional Markov chain of just the persistence state was considered and solved explicitly. Imperfect power control for voice was accounted for. In this work, the protocol is studied in greater detail. Stability of the protocol is investigated and critical data load values developed. The results also show that at high data loads additional admission control such as limited retries will be necessary to maintain stability. Simulation results show good agreement with the analysis, in the desirable operating regions.
In this work, we consider the problem of minimizing average paging cost and polling delay in a wireless system. It is assumed that users to be paged move according to a general motion process during the paging events....
详细信息
In this work, we consider the problem of minimizing average paging cost and polling delay in a wireless system. It is assumed that users to be paged move according to a general motion process during the paging events. We find and evaluate the optimal sequential paging strategies for given maximum delay tolerance and compare our results to the classical paging strategy as well as the optimal strategies for stationary units (users).
We analyze the capacity of the Hamming associative memory and explore its relation to the exponential DAM (Chiueh and Goodman, 1991). In particular, it is shown that for a sufficiently large but finite radix, the expo...
详细信息
We analyze the capacity of the Hamming associative memory and explore its relation to the exponential DAM (Chiueh and Goodman, 1991). In particular, it is shown that for a sufficiently large but finite radix, the exponential DAM operates as a Hamming associative memory.
One of the challenges of feature extraction is the ability to deal with complexities intrinsic to vast data sets in high-dimensional spaces. Multivariate methods are generally used to identify and eliminate unnecessar...
详细信息
One of the challenges of feature extraction is the ability to deal with complexities intrinsic to vast data sets in high-dimensional spaces. Multivariate methods are generally used to identify and eliminate unnecessary dimensions so as to encourage a more parsimonious representation of the data set while retaining the maximum information content possible. In this paper, we survey multivariate statistical approaches and introduce their neural network counterparts to perform linear and nonlinear dimensionality reduction. The usefulness of the various techniques is demonstrated using real-life data.
This paper deals with the cyclo-static (periodic) scheduling of iterative instruction sequences on VLIW-processor architectures, in the case when the period is imposed (periodic real time constraints). This problem na...
详细信息
This paper deals with the cyclo-static (periodic) scheduling of iterative instruction sequences on VLIW-processor architectures, in the case when the period is imposed (periodic real time constraints). This problem naturally arises when designing VLIW-processor architectures as I/O interfaces between cyclo-static-processor arrays and the external world. Three important mapping problems related to periodic real time constraints are discussed, depending on the VLIW-processor resource constraints and optimization criteria that are considered. Precise conditions under which there exist cycle-static schedules are formulated. Whenever possible, we present systematic and optimal mapping methodologies with polynomial solution time. The starting point is thereby a novel description of iterative instruction sequences in the form of generalized directed acyclic graphs (DAG's). Finally, an innovative VLIW-processor architecture, called Extended Periodic Operation Model (EPOM) with distributed shift register file, which optimally fits into the mapping trajectory, is presented.
暂无评论