Loading [MathJax]/jax/output/CommonHTML/jax.js
Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    DYNAMIC ALLOCATION OF FINITE AUTOMATA STATES FOR FAST STRING RECOGNITION

    The spatial and temporal locality of reference on which cache memory relies to minimize cache swaps, is exploited to design a new algorithm for finite automaton string recognition. It is shown that the algorithm, referred to as the Dynamic State Allocation algorithm outperforms the traditional table-driven algorithm for strings that tend to repeatedly access the same set of states, provided that the string is long enough to amortize the allocation cost. Further improvements on the algorithm result in even better performance.

  • articleNo Access

    FORMAL DESCRIPTIONS OF CODE PROPERTIES: DECIDABILITY, COMPLEXITY, IMPLEMENTATION

    The branch of coding theory that is based on formal languages has produced several methods for defining code properties, including word relations, dependence systems, implicational conditions, trajectories, and language inequations. Of those, the latter three can be viewed as formal methods in the sense that a certain formal expression can be used to denote a code property. Here we present a formal method which is based on transducers. Each transducer of a certain type defines/describes a desired code property. The method provides simple and uniform decision procedures for the basic questions of property satisfaction and maximality for regular languages. Our work includes statements about the hardness of deciding some of the problems involved. It turns out that maximality can be hard to decide even for "classical" code properties of finite languages. We also present an initial implementation of a LAnguage SERver capable of deciding the satisfaction problem for a given transducer code property and regular language.

  • articleNo Access

    On the Computational Complexity of Finite Operations

    The essential variables in a finite function f are defined as variables which occur in f and weigh with the values of that function. The number of essential variables is an important measure of complexity for discrete functions. When replacing some variables in a function with constants the resulting functions are called subfunctions, and when replacing all essential variables in a function with constants we obtain an implementation of this function. Such an implementation corresponds with a path in an ordered decision diagram (ODD) of the function which connects the root with a leaf of the diagram. The sets of essential variables in subfunctions of f are called separable in f. In this paper we study several properties of separable sets of variables in functions which directly affect the number of implementations and subfunctions in these functions.

    We define equivalence relations which classify the functions of k-valued logic into classes with the same number of: (i) implementations; (ii) subfunctions; and (iii) separable sets. These relations induce three transformation groups which are compared with the lattice of all subgroups of restricted affine group (RAG). This allows us to solve several important computational and combinatorial problems.

  • articleNo Access

    IMPLEMENTATION OF NON-LOCAL CNOT WITH MULTIPLE TARGETS OPERATION BY GHZ STATE AND ENTANGLED PURIFICATION

    We show how a non-local quantum CNOT with (N-1)-target operation can be implemented with unit fidelity and unit probability by using a N-qubit maximally entangled GHZ state as quantum channel. We also put forward two schemes for probabilistic implementing the operation with unit fidelity by employing a partially entangled pure GHZ state as quantum channel. The overall physical resources required for accomplishing these schemes are different, and the successful implementation probabilities are also different. We also point out the non-local CNOT with (N-1)-target operation can be used as a purification protocol to concentrate entanglement from an ensemble of partially entangled GHZ states into a subensemble of maximally entangled ones.

  • articleNo Access

    REMOTE INTERACTIONS ON DISTRIBUTED QUANTUM SYSTEMS: NON-LOCAL CONDITIONAL OPERATIONS AND PRODUCTION OF MULTIPARTICLE ENTANGLED STATE

    We present a systematic simple method for constructing non-local quantum conditional rotation with single target and multiple targets operations. We firstly show how a non-local conditional rotation with single target operation can be implemented with unit fidelity and unit probability by using a maximally entangled pair as quantum channel. We also put forward a scheme for probabilistically implementing the operation with unit fidelity by employing a partially entangled pair as quantum channel. The required physical resources for implementation of the non-local operation in these two cases are discussed. We further consider non-local conditional rotation with multiple targets operations on N spatially distributed systems, and show that the number of possible distinct operations increases here exponentially, with the available number of entangled pairs that are initially distributed between systems. We also point out that the non-local conditional rotation operation can be used to generate multiparticle entanglement between particles belonging to distant users in a communication network and distributed quantum computer.

  • articleNo Access

    AN IMPLEMENTATION OF LATTICE FILTERS USING FOUR OPERANDS REAL MULTIPLY ACCUMULATION

    Four operands Real Multiply Accumulation (4op-RMA) is a method to implement transversal circuits, direct form circuits and 2D type circuits with real coefficients by using a complex multiplier. Digital Signal Processors (DSPs) with 4op-RMA implement these circuits twice as fast as the conventional ones. Besides, we can simplify the programs on such DSPs. However 4op-RMA have not been applied to the lattice circuits yet because of their circuit structures. In this paper, we propose an implementation method for the lattice circuits by using 4op-RMA. The lattice part can be calculated by a 4op-RMA operation, which corresponds to a complex multiplication.

  • articleNo Access

    FPGA Implementation of the IEEE 802.16 Physical Layer for SHVC Video Transmission

    This paper presents a video transmission system for scalable High-Efficiency Video Coding (HEVC) videos using a 4G standard’s physical layer. SHVC, the scalable HEVC is used to compress the different layers of videos into binary files. The resultant binary files are easily transportable over any network thus solving many issues mainly related to videos with high resolutions. Three scenarios are studied and simulated at first, namely, Single Input Single Output (SISO), Multiple Input Single Output (MISO) and MIMO. Since the MIMO scenario offers the best results, it is considered in the implementation of the system on Field Programmable Gate Array (FPGA) using Xilinx System Generator (XSG). A Simulink model is developed under Matlab to simulate the video transmission scenarios using the WIMAX physical layer. Then, the MIMO system is implemented using a Zed-Board to co-simulate the video transmission in real-time and which allows a successful reception of the video sequences.

  • articleNo Access

    An Efficient and High-Speed Implementation of QRD-MGS Algorithm for STAP Application Based on Floating Point FPGAs

    Space-Time Adaptive Processing (STAP) can harness the efficacy of interference and clutter significantly. Calculations of the STAP weights involve solving linear equations which require very intensive computations. In this paper, the QR decomposition (QRD) using the modified gram-schmidt (MGS) algorithm is parameterized with vector size to create a trade-off between the hardware resources utilization and computation time. To achieve an efficient floating point structure, the proposed architecture of QRD-MGS algorithm is simulated and implemented in two modes: single-vector and multi-vector. Results show that the multi-vector method can lead to a high-performance design with higher operating frequency, lower power consumption, and less resource utilization than the single-vector method. For example, Modelism simulations show that the decomposition of a 12×51 matrix with vector size of 17 takes 7.86μs with the maximum clock frequency of 282MHz, for implementation on the Arria10 FPGA. In real STAP applications, the matrix sizes are too large to be fit on FPGAs and the update rate of the weights are high. Therefore, this method can fit any matrix in the contemporary FPGAs with an acceptable update rate.

  • articleNo Access

    A New Dynamical Circuit Based on CCII+, Physical Implementation and Synchronization

    In this study, a second-generation positive current conveyor (CCII+)-based analog circuit is proposed for the electronic implementation of a different dynamical system which is an adaptation of the chaotic Lorenz differential equation set. The proposed circuit is more cost-effective and contains less active and passive elements than the circuit obtained by applying the classical parallel synthesis method with opamps. Mathematical analyses and SPICE simulations are performed for chaotic phase portraits and bifurcation diagrams. The proposed dynamical circuit is implemented on the board by using commercially available active and passive elements on the market and an experimental study is conducted. In order to demonstrate the usability of this proposed circuit in secure communication studies, three different synchronization methods are applied and one of them is implemented. The obtained experimental results are in good agreement with the mathematical analysis and simulation results.

  • articleNo Access

    AN APPROACH TO CHECKING THE COMPLIANCE OF USER PERMISSION POLICY IN SOFTWARE DEVELOPMENT

    The Security policy of a software system is a set of actions that the system should or should not do in given conditions. These actions can be considered as critical properties in many applications which require high level of safety, such as the military, bank or stock software systems. Security policy must be specified clearly in software requirements and then be followed strictly and correctly in implementations. User permission policy is one of the most important aspects in software security policy. This paper proposes an approach for checking the conformance between user permissions of an implementation and their given specifications. In this approach, the source code of a program is represented at an abstraction level called Abstract Syntax Tree, which are then checked against specification of user permissions expressed using Role-Based Access Control (RBAC). A checking tool has been developed and verified using several common examples.

  • articleNo Access

    FAST SOFTWARE FOR BOX INTERSECTIONS

    We present fast implementations of a hybrid algorithm for reporting box and cube intersections. Our algorithm initially takes a divide-and-conquer approach and switches to simpler algorithms for low numbers of boxes. We use our implementations as engines to solve problems about geometric primitives. We look at two such problems in the category of quality analysis of surface triangulations.

  • articleNo Access

    A Robust Implementation for Three-Dimensional Delaunay Triangulations

    This paper presents an implementation for Delaunay triangulations of three-dimensional point sets. The code uses a variant of the randomized incremental flip algorithm and employs symbolic perturbation to achieve robustness. The algorithm's theoretical time complexity is quadratic in n, the number of input points, and this is optimal in the worst case. However, empirical running times are proportional to the number of triangles in the final triangulation, which is typically linear in n. Even though the symbolic perturbation scheme relies on exact arithmetic, the resulting code is efficient in practice. This is due to a careful implementation of the geometric primitives and the arithmetic module. The source code is available on the Internet.

  • articleFree Access

    Classifying finite monomial linear groups of prime degree in characteristic zero

    Let p be a prime and let be the complex field. We explicitly classify the finite solvable irreducible monomial subgroups of GL(p,) up to conjugacy. That is, we give a complete and irredundant list of GL(p,)-conjugacy class representatives as generating sets of monomial matrices. Copious structural information about non-solvable finite irreducible monomial subgroups of GL(p,) is also proved, enabling a classification of all such groups bar one family. We explain the obstacles in that exceptional case. For p3, we classify all finite irreducible subgroups of GL(p,). Our classifications are available publicly in MAGMA.

  • articleNo Access

    EFFICIENT DEFEASIBLE REASONING SYSTEMS

    For many years, the non-montonic reasoning community has focussed on highly expressive logics. Such logics have turned out to be computationally expensive, and have given little support to the practical use of non-monotonic reasoning. In this work we discuss defeasible logic, a less-expressive but more efficient non-monotonic logic. We report on two new implemented systems for defeasible logic: a query answering system employing a backward-chaining approach, and a forward-chaining implementation that computes all conclusions. Our experimental evaluation demonstrates that the systems can deal with large theories (up to hundreds of thousands of rules). We show that defeasible logic has linear complexity, which contrasts markedly with most other non-monotonic logics and helps to explain the impressive experimental results. We believe that defeasible logic, with its efficiency and simplicity, is a good candidate to be used as a modeling language for practical applications, including modelling of regulations and business rules.

  • articleNo Access

    DATA FLOW COHERENCE CONSTRAINTS FOR PRUNING THE SEARCH SPACE IN ILP TOOLS

    In this paper we present a new method that uses data-flow coherence constraints in definite logic program generation. We outline three main advantages of these constraints supported by our results: i) drastically pruning the search space (around 90%), ii) reducing the set of positive examples and reducing or even removing the need for the set of negative examples, and iii) allowing the induction of predicates that are difficult or even impossible to generate by other methods. Besides these constraints, the approach takes into consideration the program termination condition for recursive predicates. The paper outlines some theoretical issues and implementation aspects of our system for automatic logic program induction.

  • articleNo Access

    THINGS TO KNOW WHEN IMPLEMENTING LPO

    The Lexicographic Path Ordering (LPO) poses an interesting problem to the implementor: How to achieve a version that is both efficient and correct? The method of program transformation helps us to develop an efficient version step-by-step, making clear the essential ideas, while retaining correctness. By theoretical analysis we show that the worst-case behavior is thereby changed from exponential to polynomial. Detailed measurements show the practical improvements of the different variants. They allow us to assess experimentally various optimizations suggested for LPO.

  • articleNo Access

    Exploring Quality Management Practices and Its Pattern Analysis in Indian Service SMEs

    Substantial research exists on quality management practices in context to large organisations with plethora of studies in manufacturing organisations while exiguously aiming service sector SMEs. As more and more organisations strive to remain competitive, the concepts and practices of quality management have received increased attention by Indian industry. The contribution of service sector in Indian economy has increased at a faster rate in comparison with other sectors. Considering the pressing need this research explores the literature for a near exhaustive list of practices in quality management by deploying qualitative and descriptive approach. Thereafter, twenty service organizations were surveyed for comprehending their adoption of the type of quality management practices. On the basis of their prioritization or apportioning weight to those practices, a descriptive pattern analysis has been deployed to detect perceived level of adoption/implementation of quality management practices. The findings represent that out of twenty one quality management practices; thirteen practices substantially have been ranked on priority while others require phenomenal acclimatization towards implementation in the Indian scenario. Analysis also reflects that the strength of service SMEs lies with customer focus, management leadership and customer feedback. Further with the integration of contextual factors, as supported by theory, a conceptual framework has been proposed exhibiting relationship between quality management practices with performance and growth. The methodological approach led to the emergence of unique dimensions culminating into new findings with both managerial and entrepreneurial implications. Directions for future scope of research and suggestions for improvement have also been recommended.

  • articleNo Access

    On the Pricing of Credit Spread Options: A Two Factor HW–BK Algorithm

    In this article we describe what a credit spread option (CSO) is and show a tree algorithm to price it. The tree algorithm we have opted for is a two factor model composed by a Hull and White (HW) one factor for the interest rate process and a Black-Karazinsky (BK) one factor for the default intensity. As opposed to the tree model of Schonbucher 1999 the intensity process cannot become negative. Having as input the risk free yield curve and market implied default probability curve the model by construction will price correctly the associated defaultable bond. We then use Market data to calibrate the model to price an at the money (ATM) CSO call and then test it to price an out of the money (OTM) Bermudan CSO call on a CDS. Furthermore the discussions in this paper show in practice the difficulties and challenges faced by financial institutions in marking to market those instruments.

  • articleNo Access

    A Fundamental Framework for Knowledge Management Implementation in SMEs

    Knowledge management (KM) is a business discipline that is currently dominated by large businesses. SMEs are generally trailing behind them in terms of applying KM principles. Various frameworks have been developed and reported in the literature, but they possess drawbacks. The characteristics, features and needs of SMEs are often not reflected in them. This paper introduces a framework for implementing KM in the SME sector, which is centred on six major themes: the types of knowledge to be managed, the socio-technical perspective of KM, the formation of a KM coordinating group, the initiatives to be implemented, a guide to deploying these initiatives, and the tools and techniques to support them. A pilot study involving a small group of academics and practitioners in the KM field was used to make a preliminary assessment of it prior to testing it in SMEs. Overall, their evaluation indicated a positive view towards the framework.

  • articleNo Access

    Organisational Learning in the Context of Strategic Reorientation

    This study tested the influences of change novelty, participation and goal setting on organisational learning. The study was conducted following the strategic reorientation of a large telecommunication firm. Major findings were: (1) Participation in strategic change is positively related to organisational learning; (2) the use of goal setting as part of the implementation process enhances organisational learning; and (3) medium and high levels of change novelty is associated with higher levels of learning than low levels of change novelty.