共查询到20条相似文献,搜索用时 0 毫秒
1.
The use of fuzzy logic in telecommunication systems and networks is recent and limited. Fundamentally, Zadeh's fuzzy set theory provides a robust mathematical framework for dealing with “real-world” imprecision and nonstatistical uncertainty. Given that the present day complex networks are dynamic, that there is great uncertainty associated with the input traffic and other environmental parameters, that they are subject to unexpected overloads, failures and perturbations, and that they defy accurate analytical modeling, fuzzy logic appears to be a promising approach to address many important aspects of networks. This paper reviews the current research efforts in fuzzy logic-based approaches to queuing, buffer management, distributed access control, load management, routing, call acceptance, policing, congestion mitigation, bandwidth allocation, channel assignment, network management, and quantitative performance evaluation in networks. The review underscores the future potential and promise of fuzzy logic in networks. The paper then presents a list of key research efforts in the areas of fuzzy logic-based algorithms and new hardware and software architectures that are necessary both to address new challenges in networking and to help realize the full potential of fuzzy logic in networks 相似文献
2.
Recent advances in optical communications not only increase the capacities of communication system but also improve the system dynamicity and survivability. Various new technologies are invented to increase the bandwidth of individual wavelength channels and the number of wavelengths transmitted per fiber. Multiple access technologies have also been developed to support various emerging applications, including real-time, on-demand and high data-rate applications, in a flexible, cost effective and energy efficient manner. 相似文献
3.
Model-based testing is focused on testing techniques which rely on the use of models. The diversity of systems and software to be tested implies the need for research on a variety of models and methods for test automation. We briefly review this research area and introduce several papers selected from the 22nd International Conference on Testing Software and Systems (ICTSS). 相似文献
4.
Dramatic improvements in SAT solver technology over the last decade and the growing need for more efficient and scalable verification solutions have fueled research in verification methods based on SAT solvers. This paper presents a survey of the latest developments in SAT-based formal verification, including incomplete methods such as bounded model checking and complete methods for model checking. We focus on how the surveyed techniques formulate the verification problem as a SAT problem and how they exploit crucial aspects of a SAT solver, such as application-specific heuristics and conflict-driven learning. Finally, we summarize the noteworthy achievements in this area so far and note the major challenges in making this technology more pervasive in industrial design verification flows. 相似文献
5.
协作多机器人系统是近年来机器人研究的热点,具有良好的应用前景.针对开展相关研究的迫切需要,总结了协作多机器人系统研究的国内外发展现状,并分别对无意识协作的仿生多机器人系统和有意识协作的异构多机器人系统研究进行论述.重点从系统构建和优化控制的宏观角度出发,对有意识协作异构多机器人系统的体系结构、环境感知以及优化控制3个方面的研究进展分别展开论述;对典型的多机器人验证任务和软硬件实验平台进行了总结;最后对协作多机器人系统的研究方向进行了展望. 相似文献
7.
Color mapping is an important technique used in visualization to build visual representations of data and information. With output devices such as computer displays providing a large number of colors, developers sometimes tend to build their visualization to be visually appealing, while forgetting the main goal of clear depiction of the underlying data.Visualization researchers have profited from findings in adjoining areas such as human vision and psychophysics which, combined with their own experience, enabled them to establish guidelines that might help practitioners to select appropriate color scales and adjust the associated color maps, for particular applications.This survey presents an overview on the subject of color scales by focusing on important guidelines, experimental research work and tools proposed to help non-expert users. 相似文献
8.
Face recognition is an efficient technique and one of the most preferred biometric modalities for the identification and verification of individuals as compared to voice, fingerprint, iris, retina eye scan, gait, ear and hand geometry. This has over the years necessitated researchers in both the academia and industry to come up with several face recognition techniques making it one of the most studied research area in computer vision. A major reason why it remains a fast-growing research lies in its application in unconstrained environments, where most existing techniques do not perform optimally. Such conditions include pose, illumination, ageing, occlusion, expression, plastic surgery and low resolution. In this paper, a critical review on the different issues of face recognition systems are presented, and different approaches to solving these issues are analyzed by presenting existing techniques that have been proposed in the literature. Furthermore, the major and challenging face datasets that consist of the different facial constraints which depict real-life scenarios are also discussed stating the shortcomings associated with them. Also, recognition performance on the different datasets by researchers are also reported. The paper is concluded, and directions for future works are highlighted. 相似文献
9.
This is a survey on graph visualization and navigation techniques, as used in information visualization. Graphs appear in numerous applications such as Web browsing, state-transition diagrams, and data structures. The ability to visualize and to navigate in these potentially large, abstract graphs is often a crucial part of an application. Information visualization has specific requirements, which means that this survey approaches the results of traditional graph drawing from a different perspective 相似文献
10.
This paper surveys in a systematic way recent advances in single-sensor imaging. In particular, the most distinctive elements of a single-sensor imaging pipeline, such as color filter array configurations, image interpolation solutions, and picture storage approaches are reviewed and commented upon. New perspectives in the field are proposed, suggesting that the demand for consumer digital camera solutions and digital color imaging applications will continue. 相似文献
12.
Network anomaly analysis is an emerging subtopic of network security. Network anomaly refers to the unusual behavior of network devices or suspicious network status. A number of intelligent visual tools are developed to enhance the ability of network security analysts in understanding the original data, ultimately solving network security problems. This paper surveys current progress and trends in network anomaly visualization. By providing an overview of network anomaly data, visualization tasks, and applications, we further elaborate on existing methods to depict various data features of network alerts, anomalous traffic, and attack patterns data. Directions for future studies are outlined at the end of this paper. 相似文献
13.
Cuckoo search (CS) is a relatively new algorithm, developed by Yang and Deb in 2009, and the same has been found to be efficient in solving global optimization problems. In this paper, we review the fundamental ideas of cuckoo search and the latest developments as well as its applications. We analyze the algorithm and gain insight into its search mechanisms and find out why it is efficient. We also discuss the essence of algorithms and its link to self-organizing systems, and finally, we propose some important topics for further research. 相似文献
14.
Various research efforts would benefit from the ability to exchange and share information (traces with packet payloads, or other detailed system logs) to enable more data-driven research. Protection of the sensitive content is crucial for extensive information sharing. We present results of Kencl and Loebl (2009) [41] and Blamey et al. (in preparation) [4] about a technique of information concealing, based on introduction and maintenance of families of repeats. The structure of repeats in DNA constitutes an important obstacle for its reconstruction by hybridisation. A large proportion of eukaryotic genomes is composed of DNA segments that are repeated either precisely or in variant form more than once. As yet, no function has been associated with many of the repeats. In the paper by Blamey et al. (in preparation) [4], the authors propose that in eukaryotes the cells have DNA as a depositary of concealed genetic information and the genome achieves the self-concealing by accumulation and maintenance of repeats. The protected information may be shared and this is useful for the development of intercellular communication and in the development of multicellular organisms. The results presented here are protected by Czech patent number 301799 and by US Patent Application number 12/670. 相似文献
15.
由天津大学软件学院发起并召集,东北大学秦皇岛分校和燕山大学承办的信息可视化战略研讨会于2012年6月9~10日在北戴河成功举行.本文总结了此次会议的讨论内容和达成的共识,对当前信息可视化和可视分析领域的挑战和国际上这方面的研究方向做了大致的分析,并对今后信息可视化和可视分析的大方向提出一些建议,以及对具体行动提出一系列倡议. 相似文献
16.
This paper presents a survey and a comparative evaluation of recent techniques for moving cast shadow detection. We identify shadow removal as a critical step for improving object detection and tracking. The survey covers methods published during the last decade, and places them in a feature-based taxonomy comprised of four categories: chromacity, physical, geometry and textures. A selection of prominent methods across the categories is compared in terms of quantitative performance measures (shadow detection and discrimination rates, colour desaturation) as well as qualitative observations. Furthermore, we propose the use of tracking performance as an unbiased approach for determining the practical usefulness of shadow detection methods.The evaluation indicates that all shadow detection approaches make different contributions and all have individual strength and weaknesses. Out of the selected methods, the geometry-based technique has strict assumptions and is not generalisable to various environments, but it is a straightforward choice when the objects of interest are easy to model and their shadows have different orientation. The chromacity based method is the fastest to implement and run, but it is sensitive to noise and less effective in low saturated scenes. The physical method improves upon the accuracy of the chromacity method by adapting to local shadow models, but fails when the spectral properties of the objects are similar to that of the background. The small-region texture based method is especially robust for pixels whose neighbourhood is textured, but may take longer to implement and is the most computationally expensive. The large-region texture based method produces the most accurate results, but has a significant computational load due to its multiple processing steps. 相似文献
17.
The mammalian skeleton is largely composed of cartilage and bone. The major functions of cartilage are first to provide a transient template for development of the axial and appendicular skeleton and secondly to provide permanent articulating joint surfaces. The unique cartilage extracellular matrix (ECM) is essential for the load-bearing and viscoelastic properties of cartilage tissues. Maintained by the chondrocytes, the ECM contains a myriad of proteins and proteoglycans organized into precise networks. Many cartilage disorders result from genetic disruption of cartilage ECM components, their interactions and/or degradation. Although technically challenging, the proteomic analysis of cartilage in development and disease is now emerging as a clinically important research area. In this article, we will review progress in the proteomic characterization of cartilage-related samples. 相似文献
18.
Industrial Geometry aims at unifying existing and developing new methods and algorithms for a variety of application areas with a strong geometric component. These include CAD, CAM, Geometric Modelling, Robotics, Computer Vision and Image Processing, Computer Graphics and Scientific Visualization. In this paper, Industrial Geometry is illustrated via the fruitful interplay of the areas indicated above in the context of novel solutions of CAD related, geometric optimization problems involving distance functions: approximation with general B-spline curves and surfaces or with subdivision surfaces, approximation with special surfaces for applications in architecture or manufacturing, approximate conversion from implicit to parametric (NURBS) representation, and registration problems for industrial inspection and 3D model generation from measurement data. Moreover, we describe a ‘feature sensitive’ metric on surfaces, whose definition relies on the concept of an image manifold, introduced into Computer Vision and Image Processing by Kimmel, Malladi and Sochen. This metric is sensitive to features such as smoothed edges, which are characterized by a significant deviation of the two principal curvatures. We illustrate its applications at hand of feature sensitive curve design on surfaces and local neighborhood definition and region growing as an aid in the segmentation process for reverse engineering of geometric objects. 相似文献
19.
Security Visualization is a very young term. It expresses the idea that common visualization techniques have been designed for use cases that are not supportive of security-related data, demanding novel techniques fine tuned for the purpose of thorough analysis. Significant amount of work has been published in this area, but little work has been done to study this emerging visualization discipline. We offer a comprehensive review of network security visualization and provide a taxonomy in the form of five use-case classes encompassing nearly all recent works in this area. We outline the incorporated visualization techniques and data sources and provide an informative table to display our findings. From the analysis of these systems, we examine issues and concerns regarding network security visualization and provide guidelines and directions for future researchers and visual system developers. 相似文献
20.
Internet usage has drastically shifted from host-centric end-to-end communication to receiver-driven content retrieval. In order to adapt to this change, a handful of innovative information/content centric networking (ICN) architectures have recently been proposed. One common and important feature of these architectures is to leverage built-in network caches to improve the transmission efficiency of content dissemination. Compared with traditional Web Caching and CDN Caching, ICN Cache takes on several new characteristics: cache is transparent to applications, cache is ubiquitous, and content to be cached is more ine-grained. These distinguished features pose new challenges to ICN caching technologies. This paper presents a comprehensive survey of state-of-art techniques aiming to address these issues, with particular focus on reducing cache redundancy and improving the availability of cached content. As a new research area, this paper also points out several interesting yet challenging research directions in this subject. 相似文献
|