In this paper, an improved example-driven symbol recognition algorithm is proposed for CAD engineering drawings. First, in order to represent the structure of symbols more clearly and simply, we involve the text entit...
详细信息
To construct Anhui-Styled Architecture (ASA) models rapidly and automatically, we proposed an automatic modeling method by analyzing the basic structure of ASA in-depth. Firstly, we built modules' database, compos...
详细信息
Robust control design for quantum systems has been recognized as a key task in the development of practical quantum technology. In this paper, we present a systematic numerical methodology of sampling-based learning c...
详细信息
ISBN:
(纸本)9781467357159
Robust control design for quantum systems has been recognized as a key task in the development of practical quantum technology. In this paper, we present a systematic numerical methodology of sampling-based learning control (SLC) for control design of quantum systems with Hamiltonian uncertainties. The SLC method includes two steps of "training" and "testing and evaluation". In the training step, an augmented system is constructed by sampling uncertainties according to possible distributions of uncertainty parameters. A gradient flow based learning and optimization algorithm is adopted to find the control for the augmented system. In the process of testing and evaluation, a number of samples obtained through sampling the uncertainties are tested to evaluate the control performance. Numerical results demonstrate the success of the SLC approach. The SLC method has potential applications for robust control design of quantum systems.
This paper describes an exact SOC-estimate mathematic model, which uses the battery state-Of-Charge (SOC) as a state variable and can simulate the whole progress of discharge accurately. The model parameters can be ca...
详细信息
While many process mining algorithms have been proposed recently, there exists no widely-accepted benchmark to evaluate these process mining algorithms. As a result, it can be difficult to compare different process mi...
详细信息
Current research on UHF RFID system security mainly focus on protecting communication safety and information privacy between a pair of specific tags and its corresponding interrogation reader. However, instead of stea...
详细信息
From the perspective of potential infinity (poi) and actual infinity, Ref [4] has confirmed that poi and aci are in 'unmediated opposition' (P,﹁P ) whether in ZFC or not; it has further been proved that the m...
详细信息
From the perspective of potential infinity (poi) and actual infinity, Ref [4] has confirmed that poi and aci are in 'unmediated opposition' (P,﹁P ) whether in ZFC or not; it has further been proved that the manners in which a variable infinitely approaches its limit also satisfy the law of intermediate exclusion. With these results as theoretical bases, this paper attempts to provide an accurate and strict logical-mathematical interpretation of the incompatibility of Leibniz's secant and tangent lines in the medium logic system from the perspective of logical mathematics.
Multi-hop time synchronization in wireless sensor networks (WSNs) is often time-consuming and error-prone due to random time-stamp delays for MAC layer access and unstable clocks of intermediate nodes. Constructive in...
详细信息
A model is established to describe the chasing process between a group of agents and a quarry. In the model, the swarm is modeled based on inter-individual attraction and repulsion, that is, each individual can neithe...
详细信息
A model is established to describe the chasing process between a group of agents and a quarry. In the model, the swarm is modeled based on inter-individual attraction and repulsion, that is, each individual can neither move away from the whole swarm nor get too close to other members. Moreover, two new functions revealing the interaction between the swarm and the quarry are introduced. Some numerical simulation results are presented to exhibit agents' collective motion behaviors, which in kinetic dynamics like what happens in real world. Main parameters' effects on chasing results are also evaluated and some simple mathematical analysis is given.
Intra prediction is the most important technology in H.264/AVC intra frame encoder. But there is extremely complicated data dependency and an immense amount of computation in intra prediction process. In order to meet...
详细信息
Intra prediction is the most important technology in H.264/AVC intra frame encoder. But there is extremely complicated data dependency and an immense amount of computation in intra prediction process. In order to meet the requirements of real-time coding and avoid hardware waste, this paper presents a parallel and high efficient H.264/AVC intra prediction architecture which targets high-resolution (e.g. 4k×2k) video encoding applications. In this architecture, the optimized intra 4×4 prediction engine can process sixteen pixels in parallel at a slightly higher hardware cost (compared to the previous four-pixel parallel architecture). The intra 16×16 prediction engine works in parallel with intra 4×4 prediction engine. It reuses the adder-tree of Sum of Absolute Transformed Difference (SATD) generator. Moreover, in order to reduce the data-dependency in intra 4×4 reconstruction loop, a block-level and mode-level co-reordering strategy is proposed. Therefore, the performance bottleneck of H.264/AVC intra encoding can be alleviated to a great extent. The proposed architecture supports full-mode intra prediction for H.264/AVC baseline, main and extended profiles. It takes only 163 cycles to complete the intra prediction process of one macroblock (MB). This design is synthesized with a SMIC 0.13μm CMOS cell library. The result shows that it takes 61k gates and can run at 215MHz, supporting real-time encoding of 4k×2k@40fps video sequences.
暂无评论