The sound generated during the production of sibilant [s] results from the impact of a turbulent jet on the incisors. Physical modeling of this phenomenon depends on the characterization of the properties of the turbu...
详细信息
The sound generated during the production of sibilant [s] results from the impact of a turbulent jet on the incisors. Physical modeling of this phenomenon depends on the characterization of the properties of the turbulent flow within the vocal tract and of the acoustic sources resulting from the presence of an obstacle in the path of the flow. The properties of the flow-induced noise strongly depend on several geometric parameters of which the inf.uence has to be determined. In this paper, a simplified vocal tract/tooth geometric model is used to carry out a numerical study on the flow-induced noise generated by a tooth-shaped obstacle placed in a channel. The performed simulations bring out a link between the level of the generated noise and the aperture of the constriction formed by the obstacle.
The carrier recovery is one key technique in the demodulation of high order quadrature amplitude modulation (QAM) signals. A carrier recovery algorithm which switches between multi-threshold polarity decision mode and...
详细信息
The carrier recovery is one key technique in the demodulation of high order quadrature amplitude modulation (QAM) signals. A carrier recovery algorithm which switches between multi-threshold polarity decision mode and decision directed mode according to the standard deviation of the frequency of numerically controlled oscillator (NCO) is proposed. The proposed algorithm can detect a proper time for the mode switch to yield lower steady state error. The simulation results demonstrate the effectiveness of the proposed algorithm in improving the performance of blind carrier recovery.
Transcriptional regulatory network identification is both a fundamental challenge in systems biology and an important practical application of data mining and machine learning. In this study, we propose a semi-supervi...
详细信息
Transcriptional regulatory network identification is both a fundamental challenge in systems biology and an important practical application of data mining and machine learning. In this study, we propose a semi-supervised learning-based integrative scoring approach to tackle this challenge and predict transcriptional regulations. Our approach out-performs a state-of-the-art label propagation method and reaches AUC scores above 0.96 for three datasets from microarray experiments in the validation. A map of the transcriptional regulatory network controlling lung surfactant homeostasis was constructed. The predicted and prioritized transcriptional regulations were further validated through experimental verifications. Many other predicted novel regulations may serve as candidates for future experimental investigations.
Non-invasive optical projection tomography (OPT) provides a method to image small animals invivo. We present two correction methods for this technique which can be applied after the images have been acquired. The firs...
详细信息
The main disadvantage of LFSR-based compression is that it should be usually combined with a constrained ATPG process, and, as a result, it cannot be effectively applied to IP cores of unknown structure. In this paper...
详细信息
ISBN:
(纸本)9783981080155
The main disadvantage of LFSR-based compression is that it should be usually combined with a constrained ATPG process, and, as a result, it cannot be effectively applied to IP cores of unknown structure. In this paper, a new LFSR-based compression approach that overcomes this problem is proposed. The proposed method allows each LFSR seed to encode as many slices as possible. For achieving this, a special purpose slice, called stop-slice, that indicates the end of a seed's usage is encoded as the last slice of each seed. Thus, the seeds include by construction the inf.rmation of where they should stop and, for that reason, we call them self-stoppable. A stop-slice generation procedure is proposed that exploits the inherent test set characteristics and generates stop slices which impose minimum compression overhead. Moreover, the architecture for implementing the proposed technique requires negligible additional hardware overhead compared to the standard LFSR-based architecture. The proposed technique is also accompanied by a seed calculation algorithm that tries to minimize the number of calculated seeds.
Since the multi-rate enhancements have been implemented in wireless ad hoc networks (MANETs), QoS-constrained multicast protocols for multimedia communication should be adapted to exploit them fully for using more eff...
详细信息
Since the multi-rate enhancements have been implemented in wireless ad hoc networks (MANETs), QoS-constrained multicast protocols for multimedia communication should be adapted to exploit them fully for using more efficiently the limited resources. To build a multicast tree with delay-guaranteed, one-hop delay and end-to-end delay must be known. The one-hop delay is the transmission time at a given link connecting two neighboring hosts, and the end-to-end delay is the time taken for a data packet from a specific source to reach the destination node. However, how to calculate the above two delays using the IEEE 802.11 MAC is still a challenging problem, because the radio channel is shared among neighbors. Further, the multi-rate enhancements make it more difficult since the neighboring relation among hosts is varied with the transmission rates. In this paper, we first propose a method to estimate the one-hop delay based on varied transmission rates by monitoring the sensed busy/idle ratio of shared channel. Then, by its aid, another method is proposed to compute the end-to-end delay. Finally, we integrate the above two methods with a typical multicast routing protocol, ODMRP, for constructing a delay-guaranteed multicast protocol. Simulation results show that the proposed method obtains more precise one-hop delay than a very recently work. Besides, the integrated protocol provides better delay guarantee than the existing protocol when the multicast traffic has delay requirement.
Workflow process mining technology is not a tool of workflow design, but it is very useful for understanding the current business processes. Workflow process mining does well in knowledge management and decision-makin...
详细信息
ISBN:
(纸本)9781424439362
Workflow process mining technology is not a tool of workflow design, but it is very useful for understanding the current business processes. Workflow process mining does well in knowledge management and decision-making support. The dynamic flow control and fuzziness make the old methods that analysis the performance of workflow not applicable. In order to solve the problem a new workflow process mining algorithm is presented.
With the flourishing development of e-commerce, the developing question is paid close attention to day by day, and e-commerce risk has become a search hotspot in recent years. According to the comparability of the e-c...
详细信息
With the flourishing development of e-commerce, the developing question is paid close attention to day by day, and e-commerce risk has become a search hotspot in recent years. According to the comparability of the e-commerce risk problem and the biological immune system, the e-commerce risk assessment model based on immune principal was presented in this paper, and the expression and procedure were given. At last, the model was applied to the case and the results show that it can be successfully applied to the e-commerce risk assessment.
暂无评论