Any sufficiently complex finite-domain constraint modelling language has the ability to express undefined values, for example division by zero, or array index out of bounds. This paper gives the first systematic treat...
详细信息
We address a large scale waste collection vehicle routing problem with time windows (VRPTW) complicated by multiple disposal trips and drivers lunch breaks. A fitness search space analysis for several problem instance...
详细信息
ISBN:
(纸本)9781605583259
We address a large scale waste collection vehicle routing problem with time windows (VRPTW) complicated by multiple disposal trips and drivers lunch breaks. A fitness search space analysis for several problem instances of the waste collection VRPTW utilizing both statistical and information theoretic measures is presented. We find that mutation landscapes were more easily distinguishable than crossover landscapes. An interesting result was that the information theoretic results seem similar for all the operators indicating the general structure of the landscapes are very similar.
We propose various logical semantics for change of awareness. The setting is that of multiple agents that may become aware of facts or other agents, or forget about them. We model these dynamics by quantifying over pr...
详细信息
The difficulty of writing, reading, and understanding formal specifications remains one of the main obstacles in adopting formal verification techniques such as model checking, theorem and runtime verification. In ord...
详细信息
Timely deletion of a large number of stale sessions monitored by Internet routers, particularly in the presence of SYN floods, is critical to prevent flow table explosion. We investigate two frameworks for purging of ...
详细信息
A copyright protection method for digital image with 1/T rate forward error correction (FEC) is proposed in this paper. In this method, the original image is lossless and the watermark is robust to malicious attacks i...
详细信息
Linking network flows is an important problem in intrusion detection as well as anonymity. Passive traffic analysis can link flows but requires long periods of observation to reduce errors. Watermarking techniques all...
This paper describes a novel speech coding concept created by introducing sparsity constraints in a linear prediction scheme both on the residual and on the prediction vector. The residual is efficiently encoded using...
详细信息
The use of subband adaptive filtering for acoustic feedback compensation in hearing aids are discussed. The outputs of the filters are replicas of the subband-decomposed probe signal that are subtracted from the true ...
详细信息
The use of subband adaptive filtering for acoustic feedback compensation in hearing aids are discussed. The outputs of the filters are replicas of the subband-decomposed probe signal that are subtracted from the true feedback probe signal measured at the microphone of the hearing aid. The resulting error is used in the normalized least-mean square (NLMS) algorithm to adjust the adaptive filter coefficients to the true feedback path. Subband adaptive filters are preferred over other filters, as they offer more flexibility in dealing with disturbing speech. The performance of feedback compensation on these subband signals allows the system to achieve better tracking of changing feedback paths and offers additional flexibility in dealing with performance-stability challenges.
暂无评论