In this study, the application of the Radial Basis Function (RBF) with Multiple Input and Multiple Output (MIMO) Neural networks to control two types of non linear model plants of unknown dynamics. For the first step ...
详细信息
In this paper, we propose a scheme for improved performance of resource reservation and call admission control for cellular networks called predictive mobility support demand (PMSD) scheme. This scheme is proposed in ...
详细信息
In this paper, we propose a scheme for improved performance of resource reservation and call admission control for cellular networks called predictive mobility support demand (PMSD) scheme. This scheme is proposed in which bandwidth is allocated more efficiently to neighboring cells by key mobility parameters in order to provide QoS guarantees for transferring traffic. The probability is used to form a cluster of cell and the shadow cluster, where a mobile unit is likely to visit. Concomitantly, to ensure continuity of on-going calls with better utilization of resources, bandwidth is borrowed from prediction nonconforming calls and existing adaptive calls without affecting the minimum QoS guarantees. We evaluate the performance of PMSD scheme by means of the simulation. We measure several performance metrics such as the call blocking probability, call dropping probability, and bandwidth utilization by comparing with the mobility support on demand borrowing (MSODB) scheme. The simulation results show that PMSD scheme provides the better performance that the one of MSODB.
In this paper, An approach for generating multi-torus chaotic attractors from a forth-order and fifth-order Jerk system is proposed via constructing a series of staircase functions. The results of generation of multi-...
详细信息
In this paper, An approach for generating multi-torus chaotic attractors from a forth-order and fifth-order Jerk system is proposed via constructing a series of staircase functions. The results of generation of multi-torus chaotic attractors is given. Finally, a block circuit diagram is designed for hardware implementation of the multi-torus chaotic attractors.
In this paper, An approach for generating multidirectional grid chaotic attractors from a third-order Jerk system is proposed via constructing a series of staircase functions, including two-directional and three-direc...
详细信息
In this paper, An approach for generating multidirectional grid chaotic attractors from a third-order Jerk system is proposed via constructing a series of staircase functions, including two-directional and three-directional multi-scroll chaotic attractors. Its dynamical behaviors are investigated by means of theoretical analysis as well as numerical simulation.
In this paper the response of printed thick-film of WO3 doped by Y2O3 to organic solvent was studied. Different ratio of doping was prepared and changes of film resistance at different temperature in present of vapori...
详细信息
Software technology enables computerized analysis to offer second opinion in various screening and diagnostic tasks to assist the clinicians. Yet, the performance of these computerized methods for medical images is qu...
Software technology enables computerized analysis to offer second opinion in various screening and diagnostic tasks to assist the clinicians. Yet, the performance of these computerized methods for medical images is questioned by experts in CAD research, owing to the use of different databases and criteria for evaluating the computer results for comparison. This paper intends to substantiate this statement by illustrating the effects of such issues with the use of 1D physiologic data and multiple databases. For this purpose, the detection of desaturation events in Sp02 and spike events in EEG are used. This is the first time that comparison between different algorithms on a common basis is carried out on an individual effort. The appraisal for all the algorithms is made on the same databases and criteria. It is surprising to find that issues for 2/3D images concur with those found in 1D data here. In evaluating the accuracy of a new algorithm, a single independent database gives results fast. This paper reveals weaknesses of such an approach. It is hoped that the supportive evidence shown here is enough for researchers to innovate a better platform for credibility in reporting performance comparison of computerized analysis algorithms.
Through the motion control experiment using Industrial Emulator(Model 220 by ECP), the performance comparison of three kinds of controllers such as PID, RIC and LQR was carried out. It was shown that RIC has the best ...
详细信息
Through the motion control experiment using Industrial Emulator(Model 220 by ECP), the performance comparison of three kinds of controllers such as PID, RIC and LQR was carried out. It was shown that RIC has the best performance in the presence of disturbances such as step one, sinusoidal one and Coulomb friction for the rigid body. LQR using feedback state variables has the best tracking performance for the flexible body. The performance of PID controller is low compared to other controllers, but the design process is simple. The most advanced controller is LQR. In order to attenuate disturbance, an additional state observer should be used to estimate it, making more complex control system. RIC lies between PID and LQR in view of complexity of design. Even though RIC is not complicated, it has good disturbance rejection ability and less tracking error. By considering these aspects, the RIC is suggested as high precision controller to be used in motion control system.
This paper proposes a novel secure binding management protocol for mobile IPv6 networks for use in the implementation of routing optimization. The idea uses the public key of the home network of a mobile node to crypt...
详细信息
ISBN:
(纸本)9780769533247
This paper proposes a novel secure binding management protocol for mobile IPv6 networks for use in the implementation of routing optimization. The idea uses the public key of the home network of a mobile node to cryptographically generate the mobile node's home address and the associated private key to sign the mobile node's authentication requests. In addition, the proposed protocol performs reachability tests for both the home address and the care-of address. The proposed protocol offloads all expensive cryptographic operations from a mobile node to its home agent. The security of the protocol is informally analysed and an initially evaluation of its performance given.
In this paper, we propose a novel method for edge detection based on difference images. In order to increase the ability of difference images in direction detection, we propose a maximum modulus technique, whose singu...
详细信息
In this paper, we propose a novel method for edge detection based on difference images. In order to increase the ability of difference images in direction detection, we propose a maximum modulus technique, whose singularities are located both by the gray differences and maximum gradient directions. That is, the singularities are located along the gradient directions with maximum difference modulus. The whole framework both on theory and application is given in this paper. Experiments show that the new technique has very good visual behaves.
In this paper, we propose a novel skeletonize method for multi width ribbon-like shapes. The two difference images with vertical and horizontal directions respectively are computed to locate the singularities of the o...
详细信息
In this paper, we propose a novel skeletonize method for multi width ribbon-like shapes. The two difference images with vertical and horizontal directions respectively are computed to locate the singularities of the original image. Then the gradient directions of these singularity points are computed. The skeletonization can be obtained by finding the centers of via pair wise singularity points using their gradient directions. The most attracting nature of this method is that it can handle multi width shapes, which is very difficult in conventional methods. The experimental results show that our method is a ldquogoodrdquo method closing to human conception.
暂无评论