Data-intensive Grid applications require huge data transferring between multiple geographically separated computing nodes where computing tasks are executed. For a future WDM network to efficiently support this type o...
详细信息
How dependability is to be assessed and ensured during Web Service operation and how unbiased and trusted mechanisms supporting this are to be developed are still open issues. This paper addresses the following questi...
详细信息
Resonance between free space light and waveguide TM mode via surface plasmon wave is reported for the first time. Simulations show that the beaming angle of the excited free space light can be controlled.
Resonance between free space light and waveguide TM mode via surface plasmon wave is reported for the first time. Simulations show that the beaming angle of the excited free space light can be controlled.
For protecting an OLT failure or mixed failures cost-effectively in access networks, we connect two single-ring access architectures into a network by using optical crossbar switching technology in which crossbar-enab...
详细信息
ISBN:
(纸本)9781557528599
For protecting an OLT failure or mixed failures cost-effectively in access networks, we connect two single-ring access architectures into a network by using optical crossbar switching technology in which crossbar-enabled OLTs protect each other.
With emerging applications in packet-transport networks such as IP-over-WDM networks (e.g., eBanking), packets need to be delivered within a bounded delay (i.e., given deadlines) with high probability. To satisfy such...
详细信息
With emerging applications in packet-transport networks such as IP-over-WDM networks (e.g., eBanking), packets need to be delivered within a bounded delay (i.e., given deadlines) with high probability. To satisfy such requirement, we propose an Inbuilt-Burstification Urgency-driven Scheduling (iBUS) Algorithm in IP-over-WDM networks. In this approach, packets are assembled into bursts according to their destinations by a preset timer. The timing burstification can reduce the amount of contentions, and support deadline constraints. Then all assembled bursts need to be scheduled efficiently with the deadline constraint. We introduce the concept of urgency degree as a scheduling metric. Bursts are scheduled according to their urgency degrees so that utilization of available network resources can be maximized under the constraint of deadlines. We also study a high-level variant of our algorithm, beta -iBUS, where the parameter beta is used to truncate the acceptable range of urgency degrees [0, 1] into [0, beta ] (where beta les 1) so that invalid scheduling caused by high urgency degrees can be minimized. Simulation experiments demonstrate that our proposal can achieve limited loss probabilities with the constraint of bounded delay.
A novel SOI grating mirror based on thin binary blazed grating layer is presented. The binary blazed grating mirror (BBGM) has the characteristics of ultra broadband reflection spectrum, high reflectivity and large an...
详细信息
ISBN:
(纸本)9781424417698
A novel SOI grating mirror based on thin binary blazed grating layer is presented. The binary blazed grating mirror (BBGM) has the characteristics of ultra broadband reflection spectrum, high reflectivity and large angular tolerances.
A low loss sharp bend is proposed and analyzed in the slow-light waveguide which is consisted of a series of silicon nanopillars. More than 90% of transmission over 100 nm bandwidth is obtained.
ISBN:
(纸本)9781424417698
A low loss sharp bend is proposed and analyzed in the slow-light waveguide which is consisted of a series of silicon nanopillars. More than 90% of transmission over 100 nm bandwidth is obtained.
Existing spatial shape-error concealment techniques are broadly based upon either parametric curves that exploit geometric information concerning a shape's contour or object shape statistics using a combination of...
详细信息
Existing spatial shape-error concealment techniques are broadly based upon either parametric curves that exploit geometric information concerning a shape's contour or object shape statistics using a combination of Markov random fields and maximum a posteriori *** categories are to some extent,able to mask errors caused by information loss,provided the shape is considered independently of the image/*** palpably however,do not afford the best solution in applications where shape is used as metadata to describe image and video *** paper presents a novel image-dependent spatial shape-error concealment(ISEC) algorithm that uses both image and shape information by employing the established rubber-band contour detecting function,with the novel enhancement of automatically determining the optimal width of the band to achieve superior error *** results qualitatively and numerically corroborate the enhanced performance of the new ISEC strategy compared with established shape-based concealment techniques.
It is well known that speech production and perception process is inherently bimodal consisting of audio and visual components. Recently there has been increased interest in using the visual modality in combination wi...
详细信息
It is well known that speech production and perception process is inherently bimodal consisting of audio and visual components. Recently there has been increased interest in using the visual modality in combination with the acoustic modality for improved speech processing. This field of study has gained the title of audio-visual speech processing. Lip movement recognition, also known as lip reading, is a communication skill which involves the interpretation of lip movements in order to estimate some important parameters of the lips that include, but not limited to, size, shape and orientation. In this paper, we represent a hybrid framework for lip reading which is based on both audio and visual speech parameters extracted from a video stream of isolated spoken words. The proposed algorithm is self-tuned in the sense that it starts with an estimations of speech parameters based on visual lip features and then the coefficients of the algorithm are fine-tuned based on the extracted audio parameters. In the audio speech processing part, extracted audio features are used to generate a vector containing information of the speech phonemes. These information are used later to enhance the recognition and matching process. For lip feature extraction, we use a modified version of the method used by F. Huang and T. Chen for tracking of multiple faces. This method is based on statistical color modeling and the deformable template. The experiments based on the proposed framework showed interesting results in recognition of isolated words.
Unnecessarily large submodels aggravate the state-space explosion problem for large Markov models. The orders of these submodels may multiplicatively flow into the size of the overall model quickly leading to intracta...
暂无评论