As machine evolution continues, human-machine collaboration systems are increasing their importance. In this paper, a social and intelligent agent is discussed as a strategy for improving the effectiveness and efficie...
详细信息
As machine evolution continues, human-machine collaboration systems are increasing their importance. In this paper, a social and intelligent agent is discussed as a strategy for improving the effectiveness and efficiency of human-machine collaboration. The proposed approach uses an embedded mind model, which enables agents to interact with the human user consistently, context-dependently, and socially. The relationship between the mind model, personality, and social behavior of the agents is studied through implementation of a prototype system as an e-learning application.
We investigate the decimation-Hadamard transform (DHT) applied to 2-level autocorrelation sequences. We present the kth-order DHT by a matrix representation and show that odd order DHT cannot realize any 2-level autoc...
详细信息
We investigate the decimation-Hadamard transform (DHT) applied to 2-level autocorrelation sequences. We present the kth-order DHT by a matrix representation and show that odd order DHT cannot realize any 2-level autocorrelation sequences. We provide two interesting experimental results including one for the second-order DHT of the generalized GWM sequences.
The weight hierarchy of a linear [n,k;q] code C over GF(q) is the sequence (d/sub 1/,d/sub 2/,...,d/sub k/) where d/sub r/ is the smallest support of an r-dimensional subcode of C. An [n,k;q] code is extremal non-chai...
详细信息
ISBN:
(纸本)0780371232
The weight hierarchy of a linear [n,k;q] code C over GF(q) is the sequence (d/sub 1/,d/sub 2/,...,d/sub k/) where d/sub r/ is the smallest support of an r-dimensional subcode of C. An [n,k;q] code is extremal non-chain if for any r and s, where 1/spl les/r
作者:
TUCK, EFPATTERSON, DPSTUART, JRLAWRENCE, MHCalling Communications Corporation. 1900 West Garvey Ave
South. Suite 200 West Covina CA 91790 USA. Chairman of Calling Communications Corporation. He is also the Managing Director of Kinship Venture Management
Inc. the general partner of Kinship Partners 11 and a General Partner of Boundary the general partner of The Boundary Fund. As a venture capitalist he has founded or participated in founding several telecommunications companies including Calling Communications Corporation Magellan Systems Corporation
manufactures of Global Positioning System receivers Applied Digital Access
manufacturer of DS-3 test access and network performance monitoring equipment Endgate Technology Corporation
specialists in satellite phased array antennas and Poynting Systems Corporation. now a division of Reliance Corporation
manufacturers of fibre optic transport equipment. He was a founder of Kebby Microwave Corporation where he invented the first solid-state. frequency-modulated commercial microwave link system. The company was acquired by ITT Corporation where he rose to the position of V.P. and Technical Director of ITT North America Telecommunications Inc. Subsequently he was V.P. of Marketing and Engineering at American Telecommunications Inc. (ATC). He was founding Director of American Telecom Inc. a joint venture between ATC and Fujitsu and has served on more than 20 boards of directors including those of three public companies. He has authored articles on microwave engineering and telephone signalling and was a contributor to Reference Data For Radio Engineers. He is a graduate of the University of Missouri at Rolla where he was later awarded an honorary Professional degree and serves on its Academy of Electrical Engineering. Mr Tuck is a Senior Member of the IEEE a Fellow of the Institution of Engineers (Australia) a Professional Member of the AIAA and a registered professional engineer in three states. More than 25 years of experience in the telecommunications industry where he has been responsibl
There is a very large demand for basic telephone service in developing nations, and remote parts of industrialized nations, which cannot be met by conventional wireline and cellular systems. This is the world's la...
详细信息
There is a very large demand for basic telephone service in developing nations, and remote parts of industrialized nations, which cannot be met by conventional wireline and cellular systems. This is the world's largest unserved market. We describe a system which uses recent advances in active phased arrays, fast-packet switching technology, adaptive routeing, and light spacecraft technology, in part based on the work of the Jet Propulsion laboratory and on recently-declassified work done on the Strategic Defense Initiative, to make it possible to address this market with a global telephone network based on a large low-Earth-orbit constellation of identical satellites. A telephone utility can use such a network to provide the same modern basic and enhanced telephone services offered by telephone utilities in the urban centres of fully-industrialized nations. Economies of scale permit capital and operating costs per subscriber low enough to provide a service to all subscribers, regardless of location, at prices comparable to the same services in urban areas of industrialized nations, while generating operating profits great enough to attract the capital needed for its construction. The bandwidth needed to support the capacity needed to gain these economies of scale requires that the system use K(alpha)-band frequencies. This choice of frequencies places unusual constraints on the network design, and in particular forces the use of a large number of satellites. Global demand for basic and enhanced telephone service is great enough to support at least three networks of the size described herein. The volume of advanced components, and services such as launch services, required to construct and replace these networks is sufficient to propel certain industries to market leadership positions in the early 21st Century.
The hardwired point to point cabling that has been the mainstay of data handling on naval ships is slowly but surely giving way to more advanced techniques that include data bussing and high speed switching networks. ...
The hardwired point to point cabling that has been the mainstay of data handling on naval ships is slowly but surely giving way to more advanced techniques that include data bussing and high speed switching networks. The U.S. Navy's AN/USQ-82(V) Shipboard Data Multiplex System (SDMS) is now installed and operating for technical and operational evaluation purposes on USS Oldendorf , a DD 963 class destroyer. The distributed switching system “SITACS” introduced at ASNE Day 1982 has now been breadboarded. In the foreign arena, NATO standard bus and network interfaces are being implemented in Norwegian, United Kingdom and Canadian shipboard systems. These developments are reviewed, and projections are made regarding future trends in naval data handling systems.
Traditional thinking regarding the data transfer vehicle needed to interconnect elements of a distributed processing combat system generally envisions one or more data busses. This paper presents the somewhat unorthod...
Traditional thinking regarding the data transfer vehicle needed to interconnect elements of a distributed processing combat system generally envisions one or more data busses. This paper presents the somewhat unorthodox viewpoint that a distributed switching network is a better transition vehicle for moving from today's federated architectures to the distributed-processing architectures of the future. The structure and operation of a distributed switching network concept, called Standard information Transfer Architecture for Combat Systems (SITACS), is briefly described. Simulation results are presented which show throughput and timing values considerably better than that achievable by data bus systems.
The rapid evolution of backdoor attacks has emerged as a significant threat to the security of autonomous driving models. An attacker injects a backdoor into the model by adding triggers to the samples, which can be a...
详细信息
The rapid evolution of backdoor attacks has emerged as a significant threat to the security of autonomous driving models. An attacker injects a backdoor into the model by adding triggers to the samples, which can be activated to manipulate the model’s inference. Backdoor attacks can lead to severe consequences, such as misidentifying traffic signs during autonomous driving, posing a risk of causing traffic accidents. Recently, there has been a gradual evolution of frequency-domain backdoor attacks. However, since the change of both amplitude and its corresponding phase will significantly affect image appearance, most of the existing frequency-domain backdoor attacks change only the amplitude, which results in a suboptimal efficacy of the attack. In this work, we propose an attack called IBAQ, to solve this problem by blurring semantic information of the trigger image through the quadratic phase. Initially, we convert the trigger and benign sample to YCrCb space. Then, we perform the fast Fourier transform on the Y channel, blending the trigger image’s amplitude and quadratic phase linearly with the benign sample’s amplitude and phase. IBAQ achieves covert injection of trigger information within amplitude and phase, enhancing the attack effect. We validate the effectiveness and stealthiness of IBAQ through comprehensive experiments.
This book aims to provide a comprehensive understanding of tensor computation and its applications in seismic data analysis, exclusively catering to seasoned researchers, graduate students, and industrial engineers al...
详细信息
ISBN:
(数字)9783031789007
ISBN:
(纸本)9783031788994;9783031789021
This book aims to provide a comprehensive understanding of tensor computation and its applications in seismic data analysis, exclusively catering to seasoned researchers, graduate students, and industrial engineers alike. Tensor emerges as a natural representation of multi-dimensional modern seismic data, and tensor computation can help prevent possible harm to the multi-dimensional geological structure of the subsurface that occurred in classical seismic data analysis.
It delivers a wealth of theoretical, computational, technical, and experimental details, presenting an engineer's perspective on tensor computation and an extensive investigation of tensor-based seismic data analysis techniques. Embark on a transformative exploration of seismic data processing—unlock the potential of tensor computation and reshape your approach to high-dimensional geological structures.
The discussion begins with foundational chapters, providing a solid background in both seismic data processing and tensor computation. The heart of the book lies in its seven chapters on tensor-based seismic data analysis methods. From structured low-tubal-rank tensor completion to cutting-edge techniques like tensor deep learning and tensor convolutional neural networks, each method is meticulously detailed. The superiority of tensor-based data analysis methods over traditional matrix-based data analysis approaches is substantiated through synthetic and real field examples, showcasing their prowess in handling high-dimensional modern seismic data. Notable chapters delve into seismic noise suppression, seismic data interpolation, and seismic data super-resolution using advanced tensor models. The final chapter provides a cohesive summary of the conclusion and future research directions, ensuring readers facilitate a thorough understanding of tensor computation applications in seismic data processing. The appendix includes a hatful of information on existing tensor computation software, enhancing the b
暂无评论