The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Time synchronization is one of the key points in distributed real-time computer system. At first, a time synchronization method under 1PPS signal is put forth. Secondly, two kinds of relevant synthetic disturbance are analyzed, and time synchronization logic is studied to cope with the disturbance. Arena software is chosen to model and simulate the time synchronization procedure. At last, the whole...
Ultrasound images are very noisy. Along with system noise, a significant noise source is the speckle phenomenon caused by interference in the viewed object. The noise of ultrasound image was always deemed as multiplicative noise, but the present multiplicative noise models are not fitting for it very well, because the noise is more complex than the simple multiplicative one. So we should consider...
There will be different stable states or attractors in ecosystem under the same external conditions. In this paper, one stochastic logistic model under external fluctuations was established. The existence of the alternative attractors and regime shift are investigated. Also, the mean first passage time is studied using stochastic dynamics theory. Results showed that there are different stable attractors...
The application of Missing Data Technique (MDT) has shown to improve the performance of speech recognition. To apply MDT to cepstral domain, this paper presents a weighted approach to compute the reliability of cepstral feature based on sigmoid function and introduces a weighted distance algorithm. It is deduced that the reliability compensates the Gaussian variance in hidden Markov model (HMM) frame...
Bayesian filtering appears in many signal processing problems, reason which has attracted the attention of many researchers to develop efficient algorithms, yet computationally affordable. Ranging from Kalman Filter (KF) to particle filters, there is a plethora of alternatives depending on model assumptions. We focus our interest into a recently developed algorithm known as the square-root Quadrature...
This paper presents a modelling method for noisy response data of a closed loop with a PI controller. A general pre-£ltering procedure is not required in this method. A three-step procedure for estimating Laplace transfer function of a process is proposed. The true closed loop response is estimated from noisy response data, exploiting orthonormal properties of Laguerre functions. Then the closed loop...
This paper presents a framework for behavioral simulations of continuous time delta-sigma modulators (CTSD) developed in Matlab/Simulink. Error sources in CTSD designs are reviewed and it is explained how sub-module specifications can be derived from a system-level target performance. The paper also discusses considerations of importance when using Simulink for CTSD modelling, like the choice of solver...
Textures can be broadly divided into two categories, namely, stochastic and deterministic. The stochastic textures are characterized by its statistical properties and do not have easily identifiable primitives. Even if one can extract such primitives, a placement rule description for such textures may be extremely complicated. One of the ways to describe and generate such textures is simultaneous...
In recent years, several devices allow to directly measure real vector fields, leading to a better understanding of fundamental phenomena such as fluid simulation or brainwater movement. This turns vector field visualization and analysis important tools for many applications in engineering and in medicine. However, real data is generally corrupted by noise, puzzling the understanding provided by those...
A novel attack method on robust 3D mesh object watermarking applications was proposed. Here we propose an adaptive noise of watermarking attack, which can make the noise intensity and the noise direction adjust in different parts of 3D mesh object. The proposed attacks consist of two main stages. First, adjust the 3D mesh object in the direct neighborhood, which can ensure to remove the watermark...
This paper presents an improved crosstalk 2pi model for noise constrained interconnects optimization. The proposed model has simple closed-form expressions, which is capable of predicting the noise amplitude and the noise pulse width of an RC interconnect as well as coupling locations (near-driver and near-receiver) on victim net. This is efficient and sufficiently accurate to be effectively incorporated...
Several activities of Web-based architectures are managed by algorithms that take runtime decisions on the basis of continuous information about the state of the internal system resources. The problem is that in this extremely dynamic context the observed data points are characterized by high variability, dispersion and noise at different time scales to the extent that existing models cannot guarantee...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.