Malicious attackers intended to annihilate the availability of network server with threats such as Transmission Control Protocol (TCP) Synchronized (SYN) Flood. The attackers usually make the server exhausted and unav...
详细信息
In the area of retrieving image databases, one of the promising approaches is to retrieve it by specifying image example. However, specifying a single image example is not always sufficient to get satisfactory result,...
详细信息
Speech recorded in real environments by distant microphones is degraded by factor like reverberation. This degradation strongly affects the performance of the speaker identification system. Three compensation approach...
详细信息
Speech recorded in real environments by distant microphones is degraded by factor like reverberation. This degradation strongly affects the performance of the speaker identification system. Three compensation approaches are investigated to improve the robustness of speaker identification in such scenarios. The first approach applies spectral subtraction before feature extraction in order to reduce the late reverberation effect. The second approach makes use of feature warping as robust features of distant speaker identification under mismatched training-testing conditions. The third approach presents a novel GMM parameters initialization method: combination division and k-means clustering. The experiment results show that the compensated system as compared with baseline system, the channel average identification rate has an increase of 11.4%, 15.4%, 17%, 17.8% on TIMIT database and 6.82%, 6.36%, 9.34%, 14% on JNAS database.
This paper aims to model and solve the Sum and Product Riddle in public announcement logic. A dynamic epistemic model is proposed, that is the linear temporal combination of the epistemic model of environment and the ...
详细信息
This paper aims to model and solve the Sum and Product Riddle in public announcement logic. A dynamic epistemic model is proposed, that is the linear temporal combination of the epistemic model of environment and the epistemic models after each announcement, such that the authors' model checking technique for temporal epistemic logic can be extended to support the modeling and verification of public announcement logic. This model checking method not only can help to find all solutions, but also verify related temporal epistemic properties. Such characteristic is not fully supported by the current version of MCK, MCMAS and DEMO. The authors implemented the proposed method in the symbolic model checker MCTK via OBDD and verified the sum and product riddle. The experimental results show that the proposed method is correct and efficient.
This paper proposes validated control system design method based on verified numerical computation. The proposed method designs a controller and validates it using verified numerical computation. We also propose a met...
详细信息
ISBN:
(纸本)9781424476428
This paper proposes validated control system design method based on verified numerical computation. The proposed method designs a controller and validates it using verified numerical computation. We also propose a method to find the numerically most design-specification satisfied controller quickly by using multiple-precision arithmetic. And, this paper applies a proposed method to pole assignment problem.
Voice over Internet Protocol (VoIP) is one of the emerging technologies today. This application offers the user a service by which one can call another person at a low cost as compare with traditional phone services. ...
详细信息
ISBN:
(纸本)9781424469925;9780769540436
Voice over Internet Protocol (VoIP) is one of the emerging technologies today. This application offers the user a service by which one can call another person at a low cost as compare with traditional phone services. One drawback to the Internet is spam, which are unsolicited or unwanted objects which often appear as unwanted messages in various email applications. For VoIP, spam refers to unsolicited and unwanted calls by the VoIP user. In this paper, we have purposed a solution to prevent the spam in VoIP. The CAPTCHA (Completely Automated Public Turing Test to Tell computers and Human Apart) method aims to determine whether the call is coming from a human or a machine. The key contribution of this paper is a proof-of-concept implementation of a CAPTCHA mechanism to prevent VoIP Spam.
This paper presents a packet-based robust Model Predictive Control (MPC) approach in a co-design framework for Wireless Networked Control systems (WNCS). Lyapunov stability is guaranteed if the optimization problem is...
详细信息
ISBN:
(纸本)9781424474264
This paper presents a packet-based robust Model Predictive Control (MPC) approach in a co-design framework for Wireless Networked Control systems (WNCS). Lyapunov stability is guaranteed if the optimization problem is feasible. An Inverse Gaussian model which represents the statistical distribution of the round-trip delay (RTD) in a IEEE802.11 WNCS was applied to support a simulation study. Monte-Carlo simulation results on a cart-mounted inverted pendulum are presented to confirm the performance advantages of packet-based robust MPC scheme.
A lightpath route management system with parallel processing capabilities and a flexible upgradability, allowing new functions to be added to the system without any system program changes, has been designed and implem...
详细信息
ISBN:
(纸本)9781424464135
A lightpath route management system with parallel processing capabilities and a flexible upgradability, allowing new functions to be added to the system without any system program changes, has been designed and implemented for IP-over-CWDM networks with ROADMs. The system can process route management functions composed of some sub applications in parallel in multi machines for high speed performance. In addition, the system was designed to have a flexible upgradability which allows adding new functions to the system, i.e. no changes of the system programs are required when adding the new functions. The system functions are to search possible lightpath routes made by ROADMs with specified switch states, and to output the total optical losses of the routes. The system was implemented and the performance was evaluated. By the system with one management and 3 calculation machines for the parallel processing, the total time to obtain the results for a 5-node IP-over-CWDM network was reduced down to 65 % of the total time by the system with a single machine without parallel processing. The system enables the network administrators to manage the lightpath reconfigurations effectively without errors by avoiding making unlinked lightpaths through routes with higher losses to connect nodes, before the reconfiguration.
This paper describes the evolution of a software testing effort during a critical period for the flagship Mars science Laboratory rover project at the Jet Propulsion Laboratory. Formal specification for post-run analy...
详细信息
To reduce the loss of visual details in simplification for textured meshes, this paper presents a simplification method based on mesh segmentation. Firstly, the model is partitioned into some sub-meshes according to t...
详细信息
To reduce the loss of visual details in simplification for textured meshes, this paper presents a simplification method based on mesh segmentation. Firstly, the model is partitioned into some sub-meshes according to their properties of appearance, such as texture, normal, etc. Thus, the correlation between sub-meshes can be decreased. Then, we calculate the error metric for the edge collapse in each sub-mesh. Lastly, we merge the simplified sub-meshes and fix the gap among them to regain an integrated mesh. Because the properties of appearance are used to separate the high-frequency details from low-frequency ones, our approach decreases the loss of the detailed. Therefore, we can not only keep the over whole contours of the model, but also maintain better geometric and appearance details. The results of experiments demonstrate our mesh segmentation based method is effective.
暂无评论