The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many embedded applications such as multimedia, signal processing and wireless communications present a streaming processing behavior. In order to take full advantage of modern multi-and many-core embedded platforms, these applications have to be parallelized by describing them in a given parallel Model of Computation (MoC). One of the most prominent MoCs is Kahn Process Network (KPN) as it allows...
Immense databases may contain critical instances or chunks-a small heap of records or instances which has domain specific information. These chunks of information are useful in future decision making for improving classification accuracy for labeling of critical, unlabeled instances by reducing false positives and false negatives. Classification process may be assessed based on efficiency and effectiveness...
The subject area of this paper is discrete-time linear time-invariant systems composed of subsystems whose state updating is asynchronous due to the clock signal arriving with delays. This leads to the synchronization error identification problem which is to find from a trajectory of the system the order in which the subsystems' states are updated. A solution to this problem based on a direct search...
This paper proposes a method which is aimed to translate English patent terms into Chinese based on head-driven method. Firstly, word alignment information and English NP parse tree are formed. The corresponding relation between word alignment information and syntactic structure which is built using restrict of head. The NP translation pattern database is formed as the gist of term reordering. Then...
MetiTarski, an automatic theorem prover for inequalities on real-valued elementary functions, can be used to verify properties of analog circuits. First, a closed form solution to the model of the circuit is obtained. We present two techniques for obtaining the closed form solution. One is based on piecewise linear modeling and the inverse Laplace transform. The other is based on small-signal analysis...
Multi-Processor Systems-on-Chip (MPSoC) designs are constructed by assembling pre-designed parameterized components. Communications are crucial to their overall functionality and performance. Formal verification methods have been intensively applied to processing elements, e.g., microprocessors. Very little work has been done with respect to communication modules. We present the formal specification...
Performance is a critical aspect for all kinds of security solutions. The Lock-Keeper is a high-level security solution which implements the concept of physical separation. To evaluate and predict the performance of Lock-Keeper, the internal data transfer process has to be analyzed and simulated. As the Lock-Keeper consists of three independent systems, connected through a hardware-based switch, with...
This paper proposes an efficient PWM switching function for modified H-bridge based multilevel inverter. The prior H-bridge based multilevel inverter can increase the number of output voltage levels by adding switch components and DC input voltage sources. If it employs seven switches and three DC sources, the number of output voltage levels becomes seven. Although its THD characteristics are improved,...
A new distribution network reconfiguration method employing plant growth simulation algorithm as optimal means has been presented. The algorithm handles the objective function and constraints separately, and adopts directional search mechanism. It can avoid falling into local optimal point, which may appear in precious bionics random algorithms due to uncertainness of some parameters and/or without...
For large and complex composite Web services which are composed by BPEL and a set of WSDL and XSD documents, we urgently need the aid of the tools in designing and selecting test cases. However, most of mature testing tools which generate test data with the information of WSDL are used for single service while the research for composition remains in the realm of theory. So we apply the theory of data-flow...
The performance of the existing non-contiguous processor allocation strategies has been traditionally carried out by means of simulation based on synthetic workload models to generate streams of incoming jobs. To validate the performance of the existing algorithms, there is need to evaluate the algorithms' performance based on real workload traces. In this paper, we evaluate the performance of several...
The two dependability means considered in this paper are rigorous design and fault tolerance. It can be complex to rigorously design some classes of systems, including fault tolerant ones, therefore appropriate abstractions are needed to better support system modelling and analysis. The abstraction proposed in this paper for this purpose is the notion of operation mode. Modes are formalised and their...
This article presents a formal framework for modeling computational genetic regulatory networks as automata, with multi-threshold protein concentration and combinatorial logical gene-protein interactions. By computing the intersection of the languages generated by these automata we obtain the complete set of pathways in a gene network. We illustrate the effectiveness of our framework in the modeling...
SpaceWire is a standard for on-board satellite networks chosen by the ESA as the basis for future data-handling architectures. However, network designers need tools to ensure that the network is able to deliver critical messages on time. Current research only seek to determine probabilistic results for end-to-end delays on wormhole networks like SpaceWire. This does not provide sufficient guarantee...
In this work, we provide an initial-connectivity-based sufficient condition for consensus of multi-dimensional Krause-Hegselmann model with uniform bounded confidence. The criterion is obtained by exploiting a Lyapunov-like function that is the largest edge length in the dynamical network. An illustrative example is carried out to show the effectiveness of the approach.
Predicting exactly the performance for distributed simulation of multi-agent based systems has considerable significance. Some investigations were realized but they usually omitted issue of communication costs between computational nodes. In this paper, we address to the communication cost models and present a model for evaluating the performance of multi-agent based simulation on Ethernet switch...
Model-based design (MBD) involves designing a model of a control system, simulating and debugging it with dedicated tools, and finally generating automatically code corresponding to this model. In the domain of embedded systems, it offers the huge advantage of avoiding the time-consuming and error-prone final coding phase. The main issue raised by MBD is the faithfulness of the generated code with...
SystemC is a discrete event simulator that enables the programmer to model complex designs with varying levels of abstraction. In order to improve precision, it can be coupled to more specialized simulators. This article introduces the concept of loose simulator coupling between an analogue simulator and SystemC. It explains the properties and advantages which include a higher simulation performance...
It is well known that the classical regression analysis, especially parametric regression analysis, is one of the important methods of extracting information from data sets. A family of regression functions, called fuzzy c-regression models (FCRM), has been presented which can be used to characterize the linear relationship to certain types of mixed data. More generally, an effective and robust method,...
The paper addresses the problem of creating a comprehensive fault injection environment, which integrates and improves various simulation and supplementary functions. This is illustrated with experimental results.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.