This paper presents ontlology-based architecture for pattern recognition in the context of static source code analysis. The proposed system has three subsystems: parser, OWL ontologies and analyser. The parser subsyst...
详细信息
ISBN:
(纸本)9783540855620
This paper presents ontlology-based architecture for pattern recognition in the context of static source code analysis. The proposed system has three subsystems: parser, OWL ontologies and analyser. The parser subsystem translates the input coded to AST that is constructed as an XML tree. The OWL ontologies define code patterns and general programming concepts. The analyser subsystem constructs instances of the input code as ontology individuals and asks the reasoner to classify them. The experience gained in the implementation of the proposed system and some practical issues are discussed. The recognition system successfully integrates the knowledge representation field and static code analysis. resulting in greater flexibility of the recognition system.
The focus of this research work is modelling time dependent swelling strain and pressure simultaneously in weak rock. Various swelling potential under different boundary conditions is considered. Free and semiconfined...
详细信息
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially increasing the secret key rate and distance that can be covered by QKD protocols with practical signals. The security a...
详细信息
The use of decoy states in quantum key distribution (QKD) has provided a method for substantially increasing the secret key rate and distance that can be covered by QKD protocols with practical signals. The security analysis of these schemes, however, leaves open the possibility that the development of better proof techniques or better classical postprocessing methods might further improve their performance in realistic scenarios. In this paper, we derive upper bounds on the secure key rate for decoy-state QKD. These bounds are based basically only on the classical correlations established by the legitimate users during the quantum communication phase of the protocol. The only assumption about the possible postprocessing methods is that double click events are randomly assigned to single click events. Further, we consider only secure key rates based on the uncalibrated device scenario which assigns imperfections such as detection inefficiency to the eavesdropper. Our analysis relies on two preconditions for secure two-way and one-way QKD. The legitimate users need to prove that there exists no separable state (in the case of two-way QKD) or that there exists no quantum state having a symmetric extension (one-way QKD) that is compatible with the available measurements results. Both criteria have been previously applied to evaluate single-photon implementations of QKD. Here we use them to investigate a realistic source of weak coherent pulses. The resulting upper bounds can be formulated as a convex optimization problem known as a semidefinite program which can be efficiently solved. For the standard four-state QKD protocol, they are quite close to known lower bounds, thus showing that there are clear limits to the further improvement of classical postprocessing techniques in decoy-state QKD.
This paper investigates how we can work towards building net-centric swarms of land, sea and air robots working together to accomplish a common goal. The goal is to bring together swarms of robots from all three secto...
详细信息
This paper investigates how we can work towards building net-centric swarms of land, sea and air robots working together to accomplish a common goal. The goal is to bring together swarms of robots from all three secto...
详细信息
This paper investigates how we can work towards building net-centric swarms of land, sea and air robots working together to accomplish a common goal. The goal is to bring together swarms of robots from all three sectors to safely benefit mankind without increasing dangers in the process. Several platforms are explored for simulation to investigate swarm robotics within heterogeneous environments.
This paper presents a distributed protocol for communication among autonomous underwater vehicles. It is a complementary approach for coordination between the autonomous underwater vehicles. This paper mainly describe...
详细信息
This paper presents a distributed protocol for communication among autonomous underwater vehicles. It is a complementary approach for coordination between the autonomous underwater vehicles. This paper mainly describes different methods for underwater communication. One of the methods is brute force approach in which messages are broadcasted to all the communication nodes, which in turn will broadcast the acknowledgement. Issues relating to this brute force approach are time delay, number of hops, power consumption, message collision and other practical issues. These issues are discussed and solved by proposing a new method to improve efficiency of this proposed approach and its effectiveness in communication among autonomous underwater vehicles.
Testable second moment stability conditions for discrete-time supervisory control systems were recently developed using the Hybrid Jump Linear Systems (HJLS's) framework. These tests are extended here to sampled-d...
详细信息
This paper investigates and contrasts the use of different Bayesian networks and a fuzzy integral for real-time sensor fusion using sonar and rangefinder laser values on an ActivMedia robot. Bayesian networks have bec...
详细信息
This paper investigates and contrasts the use of different Bayesian networks and a fuzzy integral for real-time sensor fusion using sonar and rangefinder laser values on an ActivMedia robot. Bayesian networks have become increasingly popular because of their ability to capitalize on the conditional probabilities present in an influence chain. The Choquet fuzzy integral, which has primarily been used for statistical analysis, has a great power of description. Comparison of the two methods indicates that noise within the sensor network can drastically affect the accuracy of the results, especially those obtained using the Bayesian network.
Underwater surveying by swarms of autonomous underwater vehicles presents problems in communication among the robots. These problems involve the bandwidth, power consumption, timing, processing power, and other Issues...
详细信息
Motion estimation is one of the most important tasks for autonomous mobile robots. Modern mobile robots are equipped with different types of visual sensors that can provide wide ranges of outputs which can be used as ...
详细信息
ISBN:
(纸本)9781424442355
Motion estimation is one of the most important tasks for autonomous mobile robots. Modern mobile robots are equipped with different types of visual sensors that can provide wide ranges of outputs which can be used as reliable inputs for the computing of the robots displacement. One of the widely used visual sensors on mobile robots is the stereo camera due to its simplicity and availability. However, the recently invented Photonic Mixer Device (PMD) that uses the time of flight principle, also becomes more and more popular because of its robustness against ambient light and weak textured surfaces. This paper introduces the compared results of the motion estimation using two different types of 3D sensors (stereo and PMD) and also suggests a new approach to fuse their data in order to improve the calculation accuracy. An experiment was conducted using a mobile robot where the motion of the robot was evaluated using a least square technique. The results from each sensor were obtained and compared to prove their capability toward the motion estimation task.
暂无评论