Fluorescence has become a widely used technique for applications in noninvasive diagnostic tissue spectroscopy. The standard model used for characterizing fluorescence photon transport in biological tissue is based on...
详细信息
ISBN:
(纸本)9781424441198
Fluorescence has become a widely used technique for applications in noninvasive diagnostic tissue spectroscopy. The standard model used for characterizing fluorescence photon transport in biological tissue is based on the diffusion approximation. On the premise that the total energy of excitation and fluorescent photon flows must be conserved, we derive the widely used diffusion equations in fluorescence spectroscopy and show that there must be an additional term to account for the transport of fluorescent photons. The significance of this additional term in modeling fluorescence spectroscopy in biological tissue is assessed.
Codes constructed from connected spatially coupled low-density parity-check code (SC-LDPCC) chains are proposed and analyzed. It is demonstrated that connecting coupled chains results in improved iterative decoding pe...
详细信息
Codes constructed from connected spatially coupled low-density parity-check code (SC-LDPCC) chains are proposed and analyzed. It is demonstrated that connecting coupled chains results in improved iterative decoding performance. The constructed protograph ensembles have better iterative decoding thresholds compared to an individual SC-LDPCC chain and require less computational complexity per bit when operating in the near-threshold region. In addition, it is shown that the proposed constructions are asymptotically good in terms of minimum distance.
In this paper, we study ensembles of connected spatially coupled low-density parity-check codes (SC-LDPCCs), i.e., ensembles described by graphs in which regular SC-LDPCC chains of various lengths serve as edges. We s...
详细信息
In this paper, we study ensembles of connected spatially coupled low-density parity-check codes (SC-LDPCCs), i.e., ensembles described by graphs in which regular SC-LDPCC chains of various lengths serve as edges. We show that, by carefully connecting individual SC-LDPCC chains, we obtain LDPC code ensembles with improved iterative decoding thresholds compared to those of a single coupled chain, in addition to reducing the decoding complexity required to achieve a specific bit error probability. Moreover, we show that, like the component SC-LDPCC chains, the proposed constructions have a typical minimum distance that grows linearly with block length.
A novel code construction based on spatially coupled low-density parity-check (SC-LDPC) code chains is presented. The proposed code ensembles are described by graphs in which individual SC-LDPC code chains of various ...
详细信息
A novel code construction based on spatially coupled low-density parity-check (SC-LDPC) code chains is presented. The proposed code ensembles are described by graphs in which individual SC-LDPC code chains of various lengths serve as edges. We demonstrate that connecting several appropriately chosen SC-LDPC code chains results in improved iterative decoding thresholds compared to those of a single coupled chain in addition to reducing the decoding complexity required to achieve a specific bit error probability.
We initiate the study of a new parameterization of graph problems. In a multiple interval representation of a graph, each vertex is associated to at least one interval of the real line, with an edge between two vertic...
详细信息
This paper presents an inertial estimator learning automata scheme by which both the short-term and long-term perspectives of the environment can be incorporated in the stochastic estimator-the long term information c...
详细信息
An important issue faced by Software-as-a-Service (SaaS) application is scalability. Each SaaS application is typically shared by multiple (tens or hundreds) organizations (tenants). Each tenant may have hundreds or t...
详细信息
An important issue faced by Software-as-a-Service (SaaS) application is scalability. Each SaaS application is typically shared by multiple (tens or hundreds) organizations (tenants). Each tenant may have hundreds or thousands of users. Thus, the number of concurrent accesses is high. Handling a large number of user requests effectively is critical for SaaS applications. Various aspects of SaaS can have a significant impact on its scalability, including levels of scalability mechanisms, automated migration, tenant awareness, workload support, fault-tolerance and recovery, software architecture and database access. This paper identifies scalability factors and discusses their impacts on the scalability of SaaS applications. Existing approaches for addressing the scalibility of SaaS applications are also analyzed, and this paper suggests some alternatives to improve SaaS scalability based on the factors identified.
Current and future on-chip networks will feature an enhanced degree of reconfigurability. Power management and virtualization strategies as well as the need to survive to the progressive onset of wear-out faults are r...
详细信息
Current and future on-chip networks will feature an enhanced degree of reconfigurability. Power management and virtualization strategies as well as the need to survive to the progressive onset of wear-out faults are root causes for that. In all these cases, a non-intrusive and efficient reconfiguration method is needed to allow the network to function uninterruptedly over the course of the reconfiguration process while remaining deadlock-free. This paper is inspired by the overlapped static reconfiguration (OSR) protocol developed for off-chip networks. However, in its native form its implementation in NoCs is out-of-reach. Therefore, we provide a careful engineering of the NoC switch architecture and of the system-level infrastructure to support a cost-effective, complete and transparent reconfiguration process. Performance during the reconfiguration process is not affected and implementation costs (critical path and area overhead) are proved to be fully affordable for a constrained system. Less than 250 cycles are needed for the reconfiguration process of an 8×8 2D mesh with marginal impact on system performance.
Knowledge governance analyses to what extent knowledge processes are influenced by governance mechanisms. A number of advances have been made in this field, but much space remains for research. However, before advanci...
详细信息
ISBN:
(纸本)9781467328432
Knowledge governance analyses to what extent knowledge processes are influenced by governance mechanisms. A number of advances have been made in this field, but much space remains for research. However, before advancing in this direction, we must have a tool to direct efforts and provide a certain notion of the progress made in research. This paper proposes a matrix that brings knowledge management processes into relation with knowledge governance objectives (ProGOb matrix). This matrix provides information about which knowledge processes affect which governance objectives, and to what extent. The ProGOb matrix can be highly useful in the current tendency towards the Web 2.0, where knowledge distribution requires knowledge governance which has clear objectives and takes specific actions.
Recently many researchers are working on Peer-to-Peer (P2P) networks, which are able to overcome the firewalls, NATs and other security devices without changing the network policy. P2P architectures will be very impor...
详细信息
Recently many researchers are working on Peer-to-Peer (P2P) networks, which are able to overcome the firewalls, NATs and other security devices without changing the network policy. P2P architectures will be very important for future distributed systems and applications. In such networks, peers are heterogeneous in providing the services and they do not have the same competence of reliability. Therefore, it is necessary to estimate whether a peer is trustworthy or not for file sharing and other services. In this paper, we propose an integrated fuzzy-based trustworthiness system for P2P Communications in JXTA-Overlay, which consists of two Fuzzy Logic Controllers (FLC1 and FLC2). For FLC1, we use three input parameters: Number of Jobs (NJ), Number of Connections (NC) and Connection Lifetime (CL) and the output is Actual Behavioural Criterion (ABC). We use ABC and Reputation (R) as input linguistic parameters for FLC2 and the output is Peer Reliability (PR). We evaluate the proposed system by computer simulations. The simulation results has shown that the proposed system has a good behaviour.
暂无评论