A new concept of decentralized behavior control architecture for humanoids, termed the Distributed Behavior Arbitration Network, is proposed in this paper. First, policies for constructing the architecture are discuss...
详细信息
The current-voltage characteristics of superconducting Bi-2223 tapes are not as sharp as those of metallic superconductors. This feature, characterized by their low n values especially at high fields and at high tempe...
The current-voltage characteristics of superconducting Bi-2223 tapes are not as sharp as those of metallic superconductors. This feature, characterized by their low n values especially at high fields and at high temperatures, is partly influenced by the sausaging of the superconducting filaments. In order to improve the n values, therefore, the effect of filament sausaging on the transport property was investigated in this research. It was found that the distribution of the thickness of the filaments is of a Gaussian type. The real distribution of the critical current density (Jc) is obtained from the thickness distribution and the apparent distribution of pinning strength estimated using the flux creep-flow model. The estimated real distribution of Jc is slightly sharper than the apparent distribution of Jc. However, the improvement of the n-value is predicted not to be remarkable, even if the filament thickness can be made uniform.
It has become a crucial issue to assure the safety for air traffic control. We consider some air traffic accidents can be avoided by verifying the safety for air traffic control logically. In this paper, we propose a ...
详细信息
It has become a crucial issue to assure the safety for air traffic control. We consider some air traffic accidents can be avoided by verifying the safety for air traffic control logically. In this paper, we propose a theoretical framework for a logical safety verification for air traffic control based on a paraconsistent logic program called an Extended Vector Annotated Logic program with Strong Negation (EVALPSN for short). Compared to other kinds of safety verification such as safety verification for railway interlocking, the safety verification for air traffic control contains more uncertainty and sometimes has to deal with probabilistic datum. Therefore, we extend EVALPSN to probabilistic EVALPSN(P-EVALPSN for short) for dealing with the safety verification containing probability. We introduce the ideas of the safety verification based on both EVALPSN and P-EVALPSN with taking a simple example for landing clearance by air traffic controllers.
It is known that the irreversibility field depends largely on the electric field criterion, Ec, for the determination of the critical current density. In addition, it was recently found that the vortex glass-liquid tr...
It is known that the irreversibility field depends largely on the electric field criterion, Ec, for the determination of the critical current density. In addition, it was recently found that the vortex glass-liquid transition field determined by the scaling of current-voltage curves also depended on the range of electric field in the measurement. In this paper the two characteristic fields are measured for a Bi-2223 silver-sheathed tape as a function of the electric field. The obtained result of the irreversibility field is compared with the theoretical result of the flux creep-flow model. Based on the agreement with the theoretical model a standard test method of the irreversibility field is proposed.
Useless-variable elimination is a transformation that eliminates variables whose values does not affect the result of a computation. We present a type-based method for useless-variable elimination and prove its correc...
详细信息
Useless-variable elimination is a transformation that eliminates variables whose values does not affect the result of a computation. We present a type-based method for useless-variable elimination and prove its correctness. The algorithm is a surprisingly simple extension of the usual type-reconstruction algorithm. Our method has several attractive features. First, it is simple, so that the proof of the correctness is clear and the method can be easily extended to deal with a polymorphic language. Second, it is efficient: for a simply-typed λ-calculus, it runs in time almost linear in the size of an input expression. Moreover, our transformation is optimal in a certain sense among those that preserve well-typedness, both for the simply-typed language and for an ML-style polymorphically-typed language.
This article presents a hybrid method of partial evaluation (PE), which is exactly as precise as naive online PE and nearly as efficient as state-of-the-art offline PE, for a statically typed call-by-value functional ...
详细信息
This article presents a hybrid method of partial evaluation (PE), which is exactly as precise as naive online PE and nearly as efficient as state-of-the-art offline PE, for a statically typed call-by-value functional language. PE is a program transformation that specializes a program with respect to a subset of its input by reducing the program and leaving a residual program. Online PE makes the reduction/residualization decision during specialization, while offline PE makes it before specialization by using a static analysis called binding-time analysis. Compared to offline PE, online PE is more precise in the sense that it finds more redexes, but less efficient in the sense that it takes more time. To solve this dilemma, we begin with a naive online partial evaluator, and make it efficient without sacrificing its precision. To this end, we (1) use state (instead of continuations) for let-insertion, (2) take a so-called cogen approach (instead of self-application), and (3) remove unnecessary let-insertion, unnecessary tags, and unnecessary values/expressions by using a type-based representation analysis, which subsumes various monovariant binding-time analyses. We implemented and compared our method and existing methods-both online and offline-in a subset of Standard ML. Experiments showed that (1) our method produces as fast residual programs as online PE and (2) it does so at least twice as fast as other methods (including a cogen approach to offline PE with a polyvariant binding-time analysis) that produce comparable residual programs.
Concepts and principles of TINA (Telecommunications information Networking Architecture) are introduced with the objective of correcting problems of centralized service control and service data model existent in INs (...
详细信息
Image metamorphosis using simple features provides flexible and easy control of visual effects. The feature-based image metamorphosis algorithm proposed by Beier and Neely (1992) suffers from two problems; speed and s...
详细信息
Image metamorphosis using simple features provides flexible and easy control of visual effects. The feature-based image metamorphosis algorithm proposed by Beier and Neely (1992) suffers from two problems; speed and strange effects. The paper presents an optimization technique to recover these problems in a reasonable time. The idea is based on local decomposition of metamorphosis into piecewise approximation and then applying the above technique to establish one-to-one correspondence to recover such effects. The combination of all mappings produces a foldover-free result as well as dominating the ghost effect. The results show that our implementation is efficient in time complexity, smoothly interpolates metamorphosis images with only a remarkably small number of specified feature points, and the speed of computations makes image metamorphosis animation reliable for interactive machines.
We present a Conceptual Model for Software Fault Localization (CMSFL), and an Automated Assistant (AASFL) called BUG-DOCTOR to aid programmers with the problem of software fault localization. A multi-dimensional appro...
详细信息
ISBN:
(纸本)0769511651
We present a Conceptual Model for Software Fault Localization (CMSFL), and an Automated Assistant (AASFL) called BUG-DOCTOR to aid programmers with the problem of software fault localization. A multi-dimensional approach is suggested with both shallow and deep reasoning phases to enhance the probability of localizing many types of faults. BUG-DOCTOR uses these two approaches and switches between them to localize the faults. The AASFL is being developed based on this theoretical model. It is programming language independent, capable of handling different programming styles and implementations.
An escape-time method was introduced to generate the images of Julia and Mandelbrot sets and has been applied to visualize attractors of iterated function systems (IFS). Rendering deterministic fractal shapes by IFS e...
详细信息
An escape-time method was introduced to generate the images of Julia and Mandelbrot sets and has been applied to visualize attractors of iterated function systems (IFS). Rendering deterministic fractal shapes by IFS escape-time methods suffer from some problems: the intersection of a ray with a fractal surface is not easy, surface normals are undefined, and the object aliases at all sampling resolutions. We propose a method called direct continuous escape-time for rendering deterministic fractals and attempt to recover these rendering problems in a reasonable time. The simple representation and the speed of computation of our algorithm makes rendering deterministic fractals reliable for interactive machines.
暂无评论