In this paper we discuss experimental results obtained with a prototype implementation of an agent-based service for generic auctions that is currently under development. We configured the service to allow parallel ex...
详细信息
In this paper we discuss experimental results obtained with a prototype implementation of an agent-based service for generic auctions that is currently under development. We configured the service to allow parallel execution of multiple English auctions with buyer and seller agents bidding from different machines. The experimental results to assess the performance of the service include latency and throughput of the service as functions of the number of participants and the number of simultaneously active auctions.
Currently we must realize a pedestrian recognition system based on image processing for embedded applications, such as automotive applications, surveillance, and robotics. In these applications, highly accurate recogn...
详细信息
ISBN:
(纸本)9780889867598
Currently we must realize a pedestrian recognition system based on image processing for embedded applications, such as automotive applications, surveillance, and robotics. In these applications, highly accurate recognition must be achieved with real-time processing under limited system resources. To achieve such a pedestrian recognition system, we implement a skeleton-based pedestrian tracking scheme which can track pedestrians accurately on Cell Broadband Engine (CBE), one of the latest high performance embedded processors for general purpose use, which has a novel memory management system to achieve efficient computation with parallel execution units. Experimental results using a test sequence show that processing time is reduced drastically when the number of SPE used for computation increases.
In near future, various wireless access technologies will be used together to provide seamless and cost effective connectivity to mobile users. Multiple wireless access systems with overlapping coverage fields will be...
详细信息
In near future, various wireless access technologies will be used together to provide seamless and cost effective connectivity to mobile users. Multiple wireless access systems with overlapping coverage fields will be accessible to a mobile terminal with multiple interfaces. One problem arising from the availability of alternatives is the unnecessary occurrences of handovers (especially vertical ones) that lead to excessive resource consumption. To avoid this, a suite of algorithms need to be deployed to limit the number of handovers. In this paper, we present an algorithm which is run in the mobile terminal and minimizes the number of handovers when the device detects the presence of wireless local area network (WLAN) signals. Conventionally, a mobile terminal should switch from cellular to WLAN whenever WLAN connectivity is available, to make use of the WLAN's high speed and low cost as much as possible. However, a considerable proportion of these handovers will be detrimental to the call quality due to potential failures. Our algorithm reduces the number of handovers whenever the predicted traveling distance inside the WLAN cell is smaller than a threshold value. Through performance analysis we show that our algorithm successfully minimizes the probability of unnecessary handovers, and through simulation we discuss about the accuracy of the distance prediction based on the received signal strength measurements.
The objective of this paper is to present a graphical-user-interface (GUI) in support of a decision support system (KASER) for machine understanding. In order to provide information between the user and the KASER duri...
详细信息
ISBN:
(纸本)9781605606170
The objective of this paper is to present a graphical-user-interface (GUI) in support of a decision support system (KASER) for machine understanding. In order to provide information between the user and the KASER during the learning process, the approach is to combine information science and cognitive science in the form of several virtual and physical multimedia screens (e.g., a whiteboard running a pen-based OS ensemble, a menu-driven touch-screen, or a multimedia output screen). The touch-screen will also facilitate navigation between virtual screens. An application to homeland security is provided as an example;however the approach has vast applicability to many problems in which a graphical form of learning is required. The integration between human and machine is to be seamless which allows the user to pose questions and retrieve answers through the multimedia system, thus accelerating the learning process.
Although it is commonly agreed that e-Government systems enhance governance, there is a lack of empirical evidence to build upon this hypothesis which, legitimately, creates reluctance among key decision makers to ado...
详细信息
Although it is commonly agreed that e-Government systems enhance governance, there is a lack of empirical evidence to build upon this hypothesis which, legitimately, creates reluctance among key decision makers to adopt e-Government, especially in local governmental agencies in developing countries, In the context of the e-Fez Project and in a close collaboration with the municipality of the Moroccan city of Fez, we developed a pilot e-Government system that facilitates citizens' access to governmental information and services. In the course of the e-Fez Project and other similar projects, we set up a methodology that emphasizes good governance at each step of an e-Government project and enables us to continuously assess the outcomes of the resulting e-Gov systems on governance. The ultimate goal is to reduce the reluctance of decision makers and to contribute in the dissemination of e-technology in developing countries through a scientific and proven methodology that systematically links eGovernment outcomes to good governance attributes.
This paper extends the well-known concept, input-to-state stability (ISS), to finite-time control problems. In other words, a new concept, finite-time input-to-state stability (FTISS), along with related concepts such...
This paper extends the well-known concept, input-to-state stability (ISS), to finite-time control problems. In other words, a new concept, finite-time input-to-state stability (FTISS), along with related concepts such as finite-time input-output stability and finite-time small-gain theorems, is discussed, and then is applied to both the finite-time stability analysis and the finite-time stabilizing feedback design. With finite-time convergence, non-smoothness has to be considered, which poses serious technical challenges in the analysis and synthesis of closed-loop finite-time systems. It is found that FTISS plays a key role in the study of finite-time stability and stabilization of nonlinear systems.
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred to as location anonymizer) responsible ...
详细信息
ISBN:
(纸本)9780769531588;9780769534114
Most of research efforts have elaborated on k-anonymity for location privacy. The general architecture for implementing k-anonymity is that there is one trusted server (referred to as location anonymizer) responsible for cloaking at least k users' locations for protecting location privacy. A location anonymizer will generate cloaked regions in which there are at least k users for query processing. Prior works only explore grid shape cloaked regions. However, grid shape cloaked regions result in a considerable amount of query results, thereby increasing the overhead of filtering unwanted query results. In this paper, we propose a cloaking algorithm in which cloaked regions are generated acording to the features of spatial networks. By exploring the features of spatial networks, the cloaked regions are very efficient for reducing query results and improving cache utilization of mobile devices. Furthermore, an index structure for spatial networks is built and in light of the proposed index structure, we develop a Spatial-Temporal Connective Cloaking algorithm(abbreviated as STCC). A simulator is implemented and extensive experiments are conducted. Experimental results show that our proposed algorithm out-performs prior cloaking algorithms in terms of the candidate query results and the cache utilization.
A fully-dry, flip-chip fabrication technology was developed for the integration of high fill factor, silicon-on-insulator (SOI) structures and CMOS-MEMS actuators. An SOI mirror array with a fill factor of 95% and rad...
详细信息
This paper analyses the relationship between the signal delay and the fractional dynamics. It is shown that some experimental signals spectra are approximated by trendlines. Based on the slope of these trendlines the ...
详细信息
Pavements usually experience different types of distress due to repeated traffic loads, aggressive environmental conditions, construction materials, soil condition of the underline subgrade, and the method of construc...
详细信息
Pavements usually experience different types of distress due to repeated traffic loads, aggressive environmental conditions, construction materials, soil condition of the underline subgrade, and the method of construction. Longitudinal and transverse cracking, potholes, rutting, and bleeding are common examples of such distresses associated with flexible pavements. As time progresses, the severity of these distreaaes increases and consequently, ride quality is adversely affected. Early detection and measurement of the extent of distresses coupled with prompt reactive measures are necessary to keep the pavement function at an acceptable level. Traditional methods for distress detection and measurement are laborious, time consuming, and subject the involved personnel to accidents. In contrast, image measurement methods are effortless, safe, and can be performed in a short time. This research paper performs image processing measurements to estimate areas of a pothole and alligator cracking, and sets a program for plane measurements of an area that experience rutting. The image measurements are compared with the traditional measurements. The results show that image measurements are close to those obtained by using the traditional methods.
暂无评论