Route selection is one of the most important problems for a car navigation system. Given a pair of origin and destination, there are many possible routes. Most current car navigation systems propose the shortest path ...
详细信息
This paper highlights the limited power penalty condition of OXADM that effect the number of maximum nodes that can be cascaded in optical network. If the limited power penalty condition is violated, the power penalty...
This paper highlights the limited power penalty condition of OXADM that effect the number of maximum nodes that can be cascaded in optical network. If the limited power penalty condition is violated, the power penalty will become infinity. The condition for limited power penalty for OXADM occur when incoherent crosstalk multiply with the number of maximum nodes;(MN-1)L. Therefore the value must be less than 174, otherwise it will become infinity. It was found that as the number of ports and number of carriers increase, the number of maximum nodes decrease. When compared with conventional OXC device, it was found that the number of maximum nodes for OXC is larger than OXADM. This is due to large power penalty in OXADM. In addition, the accumulation function in OXADM reduces the scalability of this device. The objective of this paper is to study the limited power penalty condition of OXADM in order to avoid infinity. In addition, according to the limited power penalty condition, the relationship between number of maximum nodes against number of ports and number of carriers are also studied. Hence, the results are compared with conventional OXC device.
Today, consumers have been able to buy various items with development of e-commerce sites and so on, while it made difficult to find items suitable for the consumer's preference from many items. Because of such si...
详细信息
Today, consumers have been able to buy various items with development of e-commerce sites and so on, while it made difficult to find items suitable for the consumer's preference from many items. Because of such situation, recommendation systems that can present items suitable for user's preference have been required. When a person prefers an item, but hesitates what to do, it is an important criterion whether the person's desires is satisfied by the item or ***, we analyzed relationship between consumer's desires and preferred items by evaluation grid method, recommending items based on constructed evaluation grids. Moreover we investigated effectiveness of recommendation based on desires in our experiment and discussed about cross-category recommendation such as recommendation of item that have different attributes or categories.
Current methods of service discovery, using the same mechanism to describe both request and advertisement and does not take into account the asymmetry between the two. Service advertisement discovery is a complete des...
详细信息
Current methods of service discovery, using the same mechanism to describe both request and advertisement and does not take into account the asymmetry between the two. Service advertisement discovery is a complete description of descriptive, information-rich features, and service request description is concerned only with some of the characteristics of services, usually does not constitute a complete description of the service. In this paper, we propose to use semantic Web query language SPARQL-DL as the service request description language to retrieve OWL-S form published services. Treat the service discovery issue as query against the knowledge base. Through the experiment, confirmed that the method is practical, simple, reliable and easy-to-use.
A method for detecting spikes and slow burst in photic evoked electroencephalogram (EEG) was proposed. The spikes were detected by combining methods of the morphological filter and the similarity coefficient in the ti...
详细信息
In 2005, an extensive taxonomy of threats for VoIP was published by a prominent industry group. Strangely, this taxonomy does not identify stegocommunication as a threat, even though many steganographic channels have ...
详细信息
In 2005, an extensive taxonomy of threats for VoIP was published by a prominent industry group. Strangely, this taxonomy does not identify stegocommunication as a threat, even though many steganographic channels have been identified in VoIP protocols. To avoid such security gaps in the future, we argue that stegocommunication should be added to the traditional list of network threats: interruption, interception, modification, fabrication. The stegocommunication threat arises when the communication channel is purchased, provided, or supervised by anyone other than the communicating parties. We illustrate a stegocommunication threat to a business owner Charles. If Charles purchases a VoIP service for business-related communications by an employee Alice, then he faces the risk that Alice may undetectably communicate a business secret to an outside party Bob. In this insider-threat scenario, Charles can mitigate his security risk by installing a stegodetector.
Scheduling is essential in peer-to-peer (P2P) video-on-demand (VoD) applications to obtain desirable user experience and high sharing efficiency. Existing systems and proposals largely utilize scheduling mechanisms th...
详细信息
Scheduling is essential in peer-to-peer (P2P) video-on-demand (VoD) applications to obtain desirable user experience and high sharing efficiency. Existing systems and proposals largely utilize scheduling mechanisms that are periodical in nature. We refer these as time-driven scheduling. In this paper we argue that the time-driven scheduling algorithm is not efficient for P2P VoD due to its inadequate resource utilization and inability in quickly adapting to the potential dynamics in such systems. We propose an event-driven scheduling algorithm for P2P VoD systems, in which the scheduler is triggered by events such as peer churn or/and random seeks. We evaluate our design through extensive simulations, and the experimental results show that event-driven scheduling outperforms time-driven scheduling in terms of both user experience and system scalability.
This paper presents an improved genetic algorithm for solving conic fitting problem. We first use several parallel small-populations genetic algorithms to obtain initial population, which has better average fitness. T...
详细信息
This paper presents an improved genetic algorithm for solving conic fitting problem. We first use several parallel small-populations genetic algorithms to obtain initial population, which has better average fitness. The range of mutation operator is also set to be gradually reduced with the growing of generation to guarantee the proportion of outstanding individuals within the population. An experiment shows that our improvements on genetic algorithm can remarkably increase the average fitness of population during evolution and enhance the performance of the algorithm as a whole.
A mixed mode Neural Perception Engine (NPE) is proposed as the pre-processing accelerator of multi-object recognition processor to reduce the computational complexity and increase its efficiency. It consists of Motion...
详细信息
A mixed mode Neural Perception Engine (NPE) is proposed as the pre-processing accelerator of multi-object recognition processor to reduce the computational complexity and increase its efficiency. It consists of Motion Estimator (ME), Visual Attention Engine (VAE) and Object Detection Engine (ODE). The fabricated chip achieves 54 GOPS 51.8 mW NPE. By implementing a fast and robust neuro-fuzzy algorithm in analog-digital mixed circuits, the area and power of the ODE is reduced by 59% and 44%, respectively, compared to those of all digital implementation. The NPE can increase the frame rate by 2.09x and reduce power consumption by 38% of the multi-object recognition processor.
This paper proposes a new method for measuring the complexity of software systems based on complex network theory. We first construct the complex network model for software system. Then, the complexity of a homogeneou...
详细信息
This paper proposes a new method for measuring the complexity of software systems based on complex network theory. We first construct the complex network model for software system. Then, the complexity of a homogeneous system is defined according to the entropy theory. With the experiments on open source software systems, we show that our method can reveal the complexity on different aspects of software systems,such as inheritance and understanding complexity.
暂无评论