The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper considers the control of neuromuscular blockade (NMB) induced by atracurium on patients subject to general surgery. The high levels of uncertainty in the process model are tackled with supervised multi-model adaptive control, for which an innovative supervisor based on least squares estimation is presented to deal with constant unknown offsets in output measurement. In order to avoid excessive...
This paper considers the problem of (in)validating switched affine models from noisy experimental data, in cases where the mode-variable is not directly observable. This problem, the dual of identification, is a crucial step when designing controllers using models identified from experimental data. Our main results are convex certificates, obtained by exploiting a combination of sparsification and...
The public Internet in its current form does not provide consistently the levels of service that real-time services such as Voice over Internet Protocol (VoIP) demand. Indeed, the scope of this gap is such that quality and reliability problems are characteristic of these services. Fully redundant dispersity routing exploiting the path diversity readily available in the Internet is one approach of...
Several scenarios exist in the modern inter- connected world which call for an efficient network interdiction algorithm. Applications are varied, including various monitoring and load shedding applications on large smart energy grids, computer network security, preventing the spread of Internet worms ad malware, policing international smuggling networks, and controlling the spread of diseases. In...
This paper studies the difference in computational power between the mesh-connected parallel computers equipped with dynamically reconfigurable bus systems and those with static ones. The mesh with separable buses (MSB) is the mesh-connected computer with dynamically reconfigurable row/column buses. The broadcasting buses of the MSB can be dynamically sectioned into smaller bus segments by program...
In a multivariable system, when multiple parameters jump simultaneously, a multiple models adaptive feedforward decoupling controller using hierarchical Dimension-By-Dimension technology is presented to solve the problems such as too many models, long computing time and so on. To find the optimal parameter, it adopts one-dimension search in series instead of multiple-dimension search in parallel....
Let X be a hidden real stochastic chain, R be a discrete finite Markov chain, Y be an observed stochastic chain. In this paper we address the problem of filtering and smoothing in the presence of stochastic switches where the problem is to recover both R and X from Y. In the classical conditionally Gaussian state space models, exact computing with polynomial complexity in the time index is not feasible...
This paper describes the design of a nonlinear controller in a power system by using the reduced multivariate polynomial (RMP) optimization algorithm with the one-shot training property. The RMP model is applied to estimate its Hessian matrix in addition to identifying the trajectory sensitivities obtained from hybrid system modeling for the power system. In this paper, the saturation limiter of the...
In this paper, we present a systematic method for the designing fault tolerant reversible arithmetic circuits for finite field or Galois fields of the form GF(2m). To tackle the problem of errors in computation, we propose error detection and correction using multiple parity prediction technique based on low density parity check (LDPC) code. For error detection and correction, we need additional garbage...
This paper proposes a new approach to analyze crosstalk of coupled interconnects in the presence of process variations. The suggested method translates correlated process variations into orthogonal random variables by principle component analysis (PCA). combined with polynomial chaos expression (PCE), the technique utilizes Stochastic Collocation Method (SCM) to analyze the system response of coupled...
By combining Fractional Spectral Subtraction (FSS) with Perceptual Linear Predictive (PLP), a hybrid method of noise robustness speech recognition isinvestigated in this paper. This method uses FSS for noisy speech to reduce noise components in the fractional Fourier domain. According to the results ofcomputing Itakura distance and Mean Square Error (MSE), an approximate optimal fractional order is...
In this paper we discuss performance results of a novel real-time closed-loop power amplifier (PA) linearization technique that has originally been proposed by Ahmed and Li. The novel approach performs on-the-fly prediction and measurement of the PA AM/AM and AM/PM non-linearity, stores such non-linear characteristics and calculates their inverse functions in order to pre-distort the base-band amplitude...
In this paper we introduce a new tool for controlling the knowledge transfer process in cryptographic protocol design. It is applied to solve a general class of problems which include most of the two-party cryptographic problems in the literature. Specifically, we show how two parties A and B can interactively generate a random integer N = p??q such that its secret, i.e., the prime factors (p, q),...
We take a complexity theoretic view of A. C. Yao's theory of communication complexity. A rich structure of natural complexity classes is introduced. Besides providing a more structured approach to the complexity of a variety of concrete problems of interest to VLSI, the main objective is to exploit the analogy between Turing machine (TM) and communication complexity (CC) classes. The latter provide...
A new two-person pebble game that models parallel computations is defined. This game extends the two-person pebble game defined in [DT85] and is used to characterize two natural parallel complexity classes, namely LOGCFL and AG1. The characterizations show a fundamental way in which the computations in these two classes differ. This game model also unifies the proofs of some well known results of...
A new technique for proving lower bounds for parallel computation is introduced. This technique enables us to obtain, for the first time. non-trivial tight lower bounds for shared-memory models of parallel computation that allow simultaneous read/write access to the same memory location. The size m of the common memory is called communication width or width in short. For a wide variety of problems...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.