Advanced development of a system operating between humans and computers (human friendly system) is more important than the evolution of computer hardware. The salient obstacle to its progress is "How do we acquir...
详细信息
Advanced development of a system operating between humans and computers (human friendly system) is more important than the evolution of computer hardware. The salient obstacle to its progress is "How do we acquire and process Kansei? How do we produce a user model and a network service using Kansei?" For preliminary investigation, we constructed fatigue expression models based on a Bayesian network (BN) using psychological and physiological data. We proposed a convergent inference system framework using multiple BNs based on ontology and agent technology. Then we described a Kansei engineering framework for Kansei information processing in a ubiquitous home and smart home. As described herein, we design new ontological categories to construct the service model using Kansei information. Results show that the Kansei modeling using our framework addresses the inference procedure and the inference result of Kansei information as an instance of ontology.
A 91.4 kHz repetition rate Er-doped dispersion managed mode-locked fiber laser was demonstrated. The pulse energy was amplified to 790 nJ though single stage amplifier.
ISBN:
(纸本)9781424438303
A 91.4 kHz repetition rate Er-doped dispersion managed mode-locked fiber laser was demonstrated. The pulse energy was amplified to 790 nJ though single stage amplifier.
We report a simplified mode-locked Er fiber laser in normal dispersion with birefringence filters compared with the one with nonlinear polarization evolution mechanism.
ISBN:
(纸本)9781424438303
We report a simplified mode-locked Er fiber laser in normal dispersion with birefringence filters compared with the one with nonlinear polarization evolution mechanism.
381 kHz repetition-rate operation of an Yb-doped fiber laser oscillator and amplifier was demonstrated. The single pulse energy was 734 nJ after the single stage amplification.
ISBN:
(纸本)9781424438303
381 kHz repetition-rate operation of an Yb-doped fiber laser oscillator and amplifier was demonstrated. The single pulse energy was 734 nJ after the single stage amplification.
As the feature size of VLSI circuits scales down and clock rates increases, circuit performance is becoming more sensitive to process variations. This paper proposes an algorithm of symmetrical buffer placement in sym...
详细信息
As the feature size of VLSI circuits scales down and clock rates increases, circuit performance is becoming more sensitive to process variations. This paper proposes an algorithm of symmetrical buffer placement in symmetrical clock trees to achieve zero-skew in theory, as well as robust low skew under process or environment variations. With the completely symmetrical structure, we can eliminate many factors of clock skew such as model inaccuracy, environment temperature and intra-die process variations. We devise a new dynamic programming scheme to handle buffer placement and wire sizing under the constraint of symmetry. By classifying the wires by tree levels and defining the level-dependent blockages, the potential candidate points in the gaps of circuit blocks can be fully explored. The algorithm is efficient for minimizing source-sink delay as well as other linear cost functions. Experiments show that our method helps to obtain a balanced design of clock tree with low delay, skew and power.
The paper summarizes recent advances in Er and Yb doped mode locked fiber lasers with saturable absorbers such as semiconductor and carbon nanotube saturable absorbers.
ISBN:
(纸本)9781424438303
The paper summarizes recent advances in Er and Yb doped mode locked fiber lasers with saturable absorbers such as semiconductor and carbon nanotube saturable absorbers.
Accelerating micro-architecture simulation is becoming increasingly urgent as the complexity of workload and simulated processor increases. This paper presents a novel two-stage sampling (TSS) scheme to accelerate the...
详细信息
ISBN:
(纸本)9781424449279
Accelerating micro-architecture simulation is becoming increasingly urgent as the complexity of workload and simulated processor increases. This paper presents a novel two-stage sampling (TSS) scheme to accelerate the sampling-based simulation. It firstly selects some large samples from a dynamic instruction stream as candidates of detail simulation and then samples some small groups from each selected first stage sample to do detail simulation. Since the distribution of standard deviation of cycle per instruction (CPI) is insensitive to microarchitecture, TSS could be used to speedup design space exploration by splitting the sampling process into two stages, which is able to remove redundant instruction samples from detail simulation when the program is in stable program phase (standard deviation of CPI is near zero). It also adopts systematic sampling to accelerate the functional warm-up in sampling simulation. Experimental results show that, by combining these two techniques, TSS achieves an average and maximum speedup of 1.3 and 2.29 over SMARTS, with the average CPI relative error is less than 3%. TSS could significantly accelerate the time consuming iterative early design evaluation process.
Fuzzy time series forecasting model is an effective method to solve the nonlinear problems forecasting. However, most published fuzzy time series based models did not count the change trend implicit in historical datu...
详细信息
Fuzzy time series forecasting model is an effective method to solve the nonlinear problems forecasting. However, most published fuzzy time series based models did not count the change trend implicit in historical datum. In this paper, authors proposed a novel method which applied heuristic information to the fuzzy time series model based on Fibonacci sequence. As an example, the USD/JPY exchange rate is tested in this model. The results show that this method not only improves the forecasting accuracy, but decreases the computational complexity.
Formal verification approaches can guarantee the correctness of security protocols. In this paper we take the well-known Needham-Schroeder public-key authentication protocol as an example, to show how we can apply the...
详细信息
ISBN:
(纸本)9781424442232
Formal verification approaches can guarantee the correctness of security protocols. In this paper we take the well-known Needham-Schroeder public-key authentication protocol as an example, to show how we can apply the symbolic model checker for multiagent systems MCTK, which is developed by us, to the verification of security protocols. One temporal epistemic property is checked successfully both in the original version and the Lowe's revised version of the Needham-Schroeder protocol. The experimental result shows that our method is an effective way to the verification of security protocol.
An arc-induced long period grating within a photonic crystal fiber with two large-diameter air holes in the cladding region has been shown as a novel curvature sensor. Due to its panda structure, the sensitivity to cu...
详细信息
An arc-induced long period grating within a photonic crystal fiber with two large-diameter air holes in the cladding region has been shown as a novel curvature sensor. Due to its panda structure, the sensitivity to curvature has been shown to be angular dependent.
暂无评论