Intelligent power management of mobile devices is getting more important as ubiquitous computing is coming true in daily life. Power aware system management relies on techniques of collecting and analyzing information...
详细信息
The evolution of learning based intelligent path planning in robot manipulators requires beforehand controllable amount of data to conduct its training and testing- activities. In this paper, a systematic collision av...
详细信息
The evolution of learning based intelligent path planning in robot manipulators requires beforehand controllable amount of data to conduct its training and testing- activities. In this paper, a systematic collision avoidance path planning algorithm is developed to offer these training data. The importance of the developed algorithm is the reality that "generalizing a solution from training data depends largely on the data representation scheme". Irrespective the initial positions of the robot links, the proposed algorithm detects the goal and obstacle positions using infra-red. detectors, determines the reachable work space area, recognizes all possible paths to the goal, checks the obstacle position relative to the recognized paths, then specify the most suitable path that avoids collision with obstacle. The simulation of the proposed algorithm proves its ability to generate any pre-determined number of records "random initial links positions, random obstacle positions, random goal positions, and their corresponding final adjustments in links' angles" required to cover the reachable work space area with collision avoidance. Simulation of the proposed algorithm proves its higher flexibility in controlling the number of resulted records which consequently controls the accuracy of any learned based intelligent path planner intended to be implemented in a future research work.
The demand for wireless multimedia communications thrives in today's consumer and corporate market. The need to evolve multimedia applications and services is at a critical point given the proliferation and integr...
详细信息
ISBN:
(纸本)9781424427024
The demand for wireless multimedia communications thrives in today's consumer and corporate market. The need to evolve multimedia applications and services is at a critical point given the proliferation and integration of wireless systems. Multimedia Broadcast Multicast Services (MBMS) was introduced in Third Generation Partnership Project (3GPP) Release 6 in order to more efficiently use network and radio resources for the transmission of multimedia data, both in the core network and most importantly in the air interface of UTRAN (UMTS Terrestrial Radio Access Network). However, several obstacles, regarding the high power requirements, should be overcome for the realization of MBMS. The fact that Node B's transmission power is a limited resource and must be shared among all MBMS users in a cell indicates the need for power control during MBMS transmissions. Several techniques, such as Dynamic Power Setting and Macro Diversity Combining, have been proposed in order to reduce the power requirements of delivering multicast traffic to MBMS users. This paper examines the efficiency of the utilization of these power saving techniques, by presenting simulation results that will reveal the amount of power that is saved.
Evolutionary algorithms have been used as powerful tool in designing neural networks. Evolutionary algorithms can be used for various tasks, such as connection weights training, structure design, learning rule adaptat...
详细信息
The aim of the study is to investigate and compare experimentally the error finding strategies of a notation-familiar group with degrees in computer science related fields and a domain-familiar group on a simulation c...
详细信息
This paper describes the design, features and advantages of a drawing application -the L.E.C.G.O-Paint application- that is part of a constructivist multi-representational computer environment designed for beginners...
详细信息
This paper describes the design and features of a computer interactive game for the learning of basic aspects of the binary system by primary level education pupils. The design of this game was based on modern social ...
详细信息
The wireless sensor network is an emerging technology that may greatly facilitate human life by providing ubiquitous sensing, computing, and communication capability. To be context-aware, one of the central issues in ...
详细信息
With the increasing use of multimedia technologies, image compression requires higher performance as well as new features. Despite of the good points of the JPEG2000, however, what has not been widely deployed is a pr...
详细信息
ISBN:
(纸本)9788955191356
With the increasing use of multimedia technologies, image compression requires higher performance as well as new features. Despite of the good points of the JPEG2000, however, what has not been widely deployed is a problem of high complexity. Comparison with the JPEG is sure that the JPEG2000 has excellent compression efficiency, but this became difficult technology for even practical use at PC because of high complexity. After minimizing all high complexity that can be minimized, it is the first prerequisite for applied product development. In this paper, we propose an optimization technique of the JPEG2000 to reduce high complexity. Using proposed method we will materialize the JPEG2000 decoder on PDA.
In 2005, Lee et al.(S.W. Lee, H.S. Kim, K.Y. Yoo, Efficient verifier-based key agreement protocol for three parties without server's public key. Applied Mathematics and Computation 167) proposed a efficient verifi...
详细信息
ISBN:
(纸本)9780769533520
In 2005, Lee et al.(S.W. Lee, H.S. Kim, K.Y. Yoo, Efficient verifier-based key agreement protocol for three parties without server's public key. Applied Mathematics and Computation 167) proposed a efficient verifier-based key agreement protocol for three parties which does not require server's public key. However, we find that the protocol is susceptible to an impersonation-of-initiator attack and an impersonation-of-responder attack. Further, we recommend a small change to the protocol that fixes the security problems.
暂无评论