Proceedings of the IEEK Conference (대한전자공학회:학술대회논문집)
The Institute of Electronics and Information Engineers (IEIE)
- 기타
2000.07b
-
The problem of noise generation due to PWM switched-mode power converter has been widely noticed from the viewpoint of Electromagnetic Interference(EMI). Many kings of topologies for resonant converters have been developed both to overcome this noise problem and to attain high power efficiency. It is reported in references that resonant converters which are derived from PWM converter using resonant switch show much lower noise characteristics than PWM converter, and that current-mode resonant converter is more sensitive to stored charge in rectifying diode than voltage-mode counterpart concerning surge generation at diode’s turn-off. On the other hand, above mentioned resonant converters have defect of high-voltage stress on semiconductor switch and complicated circuit configuration. Hence, the simplified Forward-type resonant converter has been proposed and investigated due to its prominent features of simplicity of circuit configuration, low voltage stress and high stability. However, its noise characteristics still remain unknown. The purpose of this paper is to study quantitatively the noise characteristics of this simplified Forward-type resonant converter by experiment and analysis. The influence of parasitic elements and stored charge in rectifying diode on noise generation has been clarified.
-
Sampling rate conversion widely used in subband coding, A/D and D/A transitions etc. is an important techniques Nyquist filters and the filter banks have been used for the sampling converter. However, they need many memories and, whenever the sampling rate is changed, it is necessary to design filters. So the objective of this paper is to present a new kernel that is quick to evaluate and has a good stopband performance.
-
A design method of nonlinear feedback shift registers that can produce maximal-period sequences is given. Such a design is based on one-to-one mappings which are similar to well-known chaotic maps. Some properties of generated binary sequences are investigated and discussed.
-
A complex coefficient filter obtained by directly exchanging several reactance elements included in a real coefficient, filter for imaginary valued resistors is described. By using the proposed method, four varieties of complex coefficient filter are obtained. The stability problem is described. Finally, the frequency responses of the proposed kiters are shown.
-
The method for immittance conversion and its mathematical properties are discussed. Some design methods for complex multilayer embeddeding networks are proposed. Furthermore, as an application of multilayer embedding networks, the equivalent circuit model of a blood vessel is shown with its simulation results.
-
In this paper, new linearization technique for bipolar OTAs using exponential-law circuits is described. The core circuit of the proposed OTAs is the multi-TANH doublet. The OTAs have adaptively biasing current sources, which consists of the exponential-law circuits. Three types of the OTAs are presented. The linear input voltage ranges of the OTAs are almost the same as the multi-TANH triplet. Further, the OTAs have lower power dissipation than the multi-TANH triplet.
-
A passive RF smart card incorporating a non volatile memory element is powered by inductive coupling to a proximately located RF reader. Therefore, the power consumption in the smart card should be low. In this study, we designed the low power passive RF smart card that is operated at 125kHz to apply to the subway ticket system.
-
For high-accuracy signal processing of differential capacitance transducers, an interface circuitry based on a switched-capacitor sample/hold circuit is developed. Driven by nonoverlapping two-phase clocks, the interface produces the output voltage which is proportional to the ratio of difference-to-sum of two capacitors of a differential transducer. Performances of a prototype chip fabricated using 0.6
$\mu\textrm{m}$ n-well CMOS process were measured and compared with those simulated by HSPICE. The measured results indicate that 0.1% resolution is achievable with the proposed interface and the temperature-dependence of the interface is small enough fur practical applications. -
In this paper color coordinate system transformation based visual servo controller has been considered Mobile robot always has a position error and an orientation error resulted from wheel slipping etc.. Even more, the errors have accumulative properties. So feedback from environments is important. In this paper by using
color model faster land mark extraction can be achieved. And the global position and the orientation of mobile robot can be known by only two land mark positions in image coordinate system. Finally, the adoption of visual information in path tracking problem makes visual servo control. -
A natural admittance control system design is presented for a particular type of interaction controller that achieve high-performance and guarantees stability. The admittance control Significantly improves performance when Coulomb friction is present in the one link robot system. The technique requires a careful choice of the target impedance. Experimental performance results are presented for a two-mass system with internal Coulomb friction. Results demonstrate that the admittance control law is successful in rejecting internal Coulomb friction force disturbances. The controller was designed and implemented on our system that we set up one link robot system and hardware configuration system, and performance results are presented.
-
In this paper, we propose the design method of distributed control system using Controller Area Network (CAN). CAN is an advanced serial communication protocol for distributed real-time control systems. It is a contention-based multi-master network whose timeliness properties come from its collision resolution algorithm which gives a high schedulable utilization and guaranteed bus access latency. With proposed method using CAN, we apply to robot controller. The effectiveness of proposed method is demonstrated by the simulation and experiment.
-
In this paper we design the robust impedance controller of the robot manipulator with time delay. The designed controller considers time delay in the position loop and stabilizes the closed-loop system. The performance of a controller can be easily degraded by external disturbances. To improve the performance when external disturbances exist, we use the disturbance observer to handle the disturbances in the velocity loop and provide robustness to the control system. To show the validity of the designed controller, several experiments are performed for the 5-DOF robot manipulator equipped with the wrist force/torque sensor system.
-
We introduce Adaptive Fuzzy Impedance Controller for position and force control when robot contact with environment. Because Robot and environment was always effected by nonlinear conditions, it need to deal with parameter’s uncertainty. For solving this problem, it induced Fuzzy System in Impedance Control so fuzzy system is impedance’s stiffness gain. We apply adaptive fuzzy impedance controller in One-Link Robot System, it shows the good performance on desired position control and force control about contacting with arbitrarily environment.
-
We propose a new curvature-compensated CMOS bandgap reference circuit that is achieved by varying a current ratio. The proposed circuit is shown to have small temperature coefficient that the output voltage variation is 0.4mV.
-
A number of studies have recently been made on hardware for a biological neuron f3r application with information processing functions of neural networks. We have been trying to produce hardware from the viewpoint that development of a new hardware neuron model is one of the important problems in the study of neural networks. In this paper, we first discuss the circuit structure of a pulse-type hardware neuron model with the enhancement-mode MOSFETs (E-MOSFETs). And we construct a pulse-type hardware neuron model using I-MOSFETs. As a result, it is shown that our proposed new model can exhibit firing phenomena even if the power supply voltage becomes less than 1.5[V]. So it is verified that our model is profitable for IC.
-
This research presents an analytical model to predict the instruction fetch rate on superscalar Processors. The proposed model is also able to analyze the performance relationship between cache miss and branch prediction miss. The proposed model takes into account various kind of architectural parameters such as branch instruction probability, cache miss rate, branch prediction miss rate, and etc.. To prove the correctness of the proposed model, we performed extensive simulations and compared the results with those of the analytical models. Simulation results showed that the pro-posed model can estimate the instruction fetch rate accurately within 10% error in most cases. The model is also able to show the effects of the cache miss and branch prediction miss on the performance of instruction fetch rate, which can provide an valuable information in designing a balanced system.
-
The purpose of this paper is to find an efficient solution for multiple constant multiplication (MCM) problem. Since the circuit structure can be represented as a directed acyclic graph, evolutionary computing is considered as an effective tool for optimization of circuit synthesis. In this paper, we propose a stack type operator as a chromosome element to synthesize a directed acyclic graph efficiently. This type of chromosome can represent a graph structure with a set of simple symbols and so we can employ the similar method to a conventional GA.
-
In this paper, we studied on the phoneme classification for Korean speech recognition. In the case of making large vocabulary speech recognition system, it is better to use phoneme than syllable or word as recognition unit. And, In order to study the difference of speech recognition according to the number of phoneme as recognition unit, we used the speech toolkit of OGI in U.S.A as recognition system. The result showed that the performance of diphthong being unified was better than that of seperated diphthongs, and we required the better result when we used the biphone than when using mono-phone as recognition unit.
-
The decoupling of the systems is to let the inputs and outputs correspond one to one, by performing the state feedback or the output feedback on the given systems. In this paper, we propose a method for decoupling the separable-denominator two-dimensional systems. And, we study about the realization dimension of the dynamical feedback and the dynamical feedforward performed for decoupling.
-
ERG signal represents the responses of the each layer of retina for the visual stimulus and accumulated responses according to the signal processing occurring in the retina. By investigating the reaction types of each wave of the ERG, various kinds of information for the diagnosis and the signal processing mechanisms in the retina can be obtained. In this paper, the ERG signal is generated by simulating of the volume conductor field of response of each retina layer and summing of them algebraically. The retina model used for simulation is Shah’s Computer Retina model which is one of the most reliable models recently developed. The generated ERG is compared with the typical ERG and shows a very close similarity. By changing the parameters of the retina model, the diagnostic investigation is performed with the variation of the ERG waveform.
-
This paper studies coverability tree and reach-ability set of Petri net under the earliest filing rule. Conventional algorithm for coverability tree for ‘normal’ Petri net is not good for Petri net under the earliest firing rule. More over, it is shown that there exists no coverability graph for general class of earliest firing Petri net. Some subclasses are studied where coverability graph can be constructed.
-
A workflow is a flow of work carried out by multiple people. In order to increase efficiency, it is re-quired to change the current workflow dynamically. Till now, three types of dynamic changes: flush, abort, and synthetic cut-over (SCO) , have been proposed. How- ever, the performance evaluations for dynamic workflow changes have not been undertaken. To do so, measuring the amount of time cost making a single change (called change time) and comparing the methods for obtaining such times become ever important. In this paper, we first define change time and then propose a computation method individually for each change type. Finally, we evaluate the performance of an example net change by computing the change times.
-
Beyond free choice net system this paper presents some liveness knowledge in asymmetric net system including necessary and sufficient condition for an asymmetric net system being live and having liveness monotonicity, and an algorithm, polynomial time complexity, for such deciding. Also two conjectures about system livenss are in the contribution.
-
We consider, in this paper, a UML-based design support system for real-time systems. However, the UML does not include any notion for verification of timing constraints. We presents transformation algorithms, as a function of the support system, of UML descriptions into Petri nets and Interval Temporal Logic models, which are very powerful for the verification. This paper shows also transformation example for simple elevator system.
-
This paper proposes a Data-Flow-Graph (DFG) restructuring to reduce calculating errors in loop folding scheduling. The prime cause of calculating error is rounding errors due to the restriction of the operation digit of functional units. This rounding error is increased more by using multipliers than adders, so reducing the number of multiplications and putting off them as much as possible reduce rounding errors. The proposed approach reduces the number of multiplications by restructuring DFG in loop folding.
-
A workflow expresses the How of persons and things related to a business. To improve efficiency of a business, it is important to grasp and evaluate the actual situation of the current business. Till now, researches on workflows have been done almost on once business and these results can not be simply applied to food business. Besides, it is also important how to evaluate a food business workflow with a specific standard. In this paper, we propose a modeling method of food business by using hierarchical Petri net. Then we propose a concept, called throughput, as a standard to evaluate the workflows. Finally we show a method how to compute throughput and meanwhile apply a Petri net tool, Design/CPN, to do simulation of computing throughput. Our simulation result shows the modeling method and computation method of throughput are reasonable and useful.
-
In this paper, we are focused on the analysis of Petri nets model using the subnet. Specially, we are proposes a divide-conquer method of Petri nets under the condition of one-boundedness for all the Petri nets. The usefulness of the approach is shown by applying the proposed techniques to a illustration model.
-
This paper deals with cryptography by applying RSA and Petri nets. Firstly, we introduce RSA cryptography and a Petri net based private-key cryptography. Then we propose a new public-key cryptography, Petri Net based Public-Key Cryptography dented as PNPKC, by taking the advantages of these two proposed cryptographys and give an example to show how to apply PNPKC. Finally, we do the comparison between RSA cryptography and PNPKC on security as well as computation order. As the results, the security of PNPKC is as strong as RSA cryptography and further the encryption and decryption of PNPKC are in average 210 times as fast as RSA cryptography from our experimental data.
-
Adaptive Fourier analysis of sinusoidal signals in noise is of essential importance in many engineering fields. So far, many adaptive algorithms have been developed for this purpose. In particular, a filter bank based algorithm called constrained notch Fourier transform of its cost-efficiency and easily controllable performance. However, its performance deteriorates when the signal frequencies are not uniformly spaced. This paper proposes, at first, a new structure for the CNFT, referred to as modified CNFT (MCNFT), to compensate the performance degeneration of the CNFT for noisy sinusoidal signals with non-uniformly spaced frequencies. Next, a detailed performance analysis for the MCNFT is conducted. Closed form expression of steady-state mean square error (MSE) for the discrete Fourier coefficients (DFCs) is derived. Extensive simulations are presented to demonstrate the improved performance of the MCNFT and the validity of the analytical results.
-
The technique of reinforcement learning algorithm is extended to solve the multiobjective control problem for uncertain dynamic systems. A multiobjective adaptive critic structure is proposed in order to realize a max-min method in the reinforcement learning process. Also, the proposed reinforcement learning technique is applied to a multiobjective satisfactory fuzzy logic controller design in which fuzzy logic subcontrollers are assumed to be derived from human experts. Some simulation results are given in order to show effectiveness of the proposed method.
-
Gradient-type algorithms for adaptive IIR notch filters are very attractive in terms of both performances and computational requirements. Generally, it is quite difficult to assess their performances analytically. There have been several trials to analyze such adaptive algorithms as the sign and the plain gradient algorithms for some types of adaptive IIR notch filters, but many of them still remain unexplored. Furthermore, analysis techniques used in those trials can not be directly applied to different types of adaptive IIR notch filters. This paper presents a detailed performance analysis of the sign algorithm for a well-known adaptive IIR notch filter with constrained poles and zeros, which can not be done by just applying the related existing analysis techniques, and therefore has not been attempted yet. The steady-state estimation error and mean square error (MSE) of the algorithm are derived in closed forms. Stability bounds of the algorithm are also assessed. extensive simulations are conducted to support the analytical findings.
-
In this paper, we used image information for the enhancement of Korean numeral speech recognition. First, a noisy environment was made by Gaussian generator at each 10 dB level and the generated signal was added to original Korean numeral speech. And then, the speech was analyzed to recognize Korean numeral speech. Speech through microphone was pre-emphasized with 0.95, Hamming window, autocorrelation and LPC analysis was used. Second, the image obtained by camera, was converted to gray level, autocorrelated, and analyzed using LPC algorithm, to which was applied in speech analysis, Finally, the Korean numerial speech recognition with image information was more ehnanced than speech-only, especially in ‘3’, ‘5’and ‘9’. As the same LPC algorithm and simple image management was used, additional computation a1gorithm like a filtering was not used, a total speech recognition algorithm was made simple.
-
This paper is addressed to Internet telephony based service implementation. It describes an implementation method which uses ARS as a gateway which combines Internet and traditional public switched telephone network for Internet information service using telephony and fax, is different to traditional Internet telephony which provide enhanced speech quality and low cost functionality. This method allows telephony and/or fax user to get Internet information without additional Internet bill, Internet infrastructure and low connection quality from low signal bandwidth connected him. Implemented system is useful to a special kind information service such as climate information of Korea etc and simpler than WAP based service as for wireless mobile telephony user. We implement job opportunity information and advertisement service supported by Home page of Choong Book Small & Medium Business Administration and e-mail service supported by Korean Society for Rehabilitation of persons with Disabilities to demonstrate the system ability. As a result of test implementation, this service system works good fur blind persons and graduated persons without job, is expected to apply for special Internet information provider via Voice and Fax.
-
The services such as real-time audio and video applications have become increasingly popular, especially over the Internet. Furthermore, as being commercialized those contents on the Internet require quality of service (QoS) support to ensure their performance. PPP is the best solution to of for those kinds of services. The reason why we want to employ PPP is this satisfies most of the requirements associated with remote connectivity to an NSP, such as IP address assignment, security, and AAA (authentication, authorization and accounting). In addition, since ISPs and corporations are familiar with PPP based connectivity, easy migration from existing ISP infrastructure is expected, if QoS is guaranteed. But so for PPP has had no field to ensure the quality of service. This article presents the solution by using some tunneling protocols and the draft [1] that proposed additional LCP option fields to negotiate QoS. To communicate each other, after negotiating those option fields, over various protocols such as ATM, Ethernet, and etc. tunneling protocol is used. Following sections will mention those briefly. And the service provision to offer the end-to-end communication with negotiated QoS will also be proposed.
-
The Internet has become widely used in many countries. In particular, a new emerging technology, the WWW (World Wide Web), which has become a major application of the Internet, has been rapidly developed. As a result, there are hundreds of millions of URLs (Uniform Resource Locators) on the WWW, and the total number of URLs is still explosively increasing. To get information from the WWW, we generally use Internet search engines. However, we cannot always get the actual information we want. Accordingly, we have solved this problem by constructing a prototype system based on agents by programming language Java for constructing a more effective search engine. This so-called “intelligent agent system on WWW” deletes redundant HTML (Hyper Text Markup Language) files and exchanges information about the existence of URLs. And we found that our prototype system is more powerful and effective than conventional search engines.
-
In recent years. XML applications are being developed in diverse area. Especially, development of XML document repository system associated with database is carrying out widely. The previous researches of XML repository system have several defects which are update and retrieval limitations for the XML document, design limitation for a formal retrieval algorithm and data redundancy. In order to solve the above problems. in this paper, we suggest relational database schemes for overcoming limitations of updating, retrieving, and rebuilding document. And suggest query translation strategy using two-phase translation that consists of pattern analyzing phase and SQL generating phase.
-
WWW(World wide Web) is a place where many laymen receive and send the information at the worldwide. A visualization of WWW is very important as one of functions helping to retrieve and browse the information. However, as the information volume displayed at one time is limited by a screen size, it is useful to limit the volume of information capable for users to browse. In this report, we propose the page-index, which extract its information according to degree of user’s interest. This index is a numbers, which relate the user’s interest with verbal and structural characteristics of homepages. The homage-index constructed with sequence of this index are useful to help a user’s browsing. We constructed the estimating system about an article of commerce and really tried to estimate. From this trial, we verified the usefulness of the page-index, homepage-index.
-
In this paper, we propose a high-speed multiplier-free realization using ROM’s to store the results of coefficient scalings in Combination With higher signal rate and pipelined operations. We show that hardware multipliers are not needed. By varying some parameters, the proposed structure provides various combinations of hardware and clock speed (or through-put). An example is given comparing the proposed realization with the distributed arithmetic (DA) realization. Results show that With Proper Choices of the Parameters the proposed structure achieves a faster processing speed with less hardware, as compared to the DA realization.
-
Although shared memory parallel programs are designed to be deterministic both in their final results and intermediate states, the races that occur when different processes access a common memory location in an order not guaranteed by synchronization could result in unintended non-deterministic executions of the program. So, Detecting races, particularly first data races, is important for debugging explicit shared memory parallel programs. It is possible that all data races reported by other on-the-fly algorithms would disappear once the first races were removed. To detect races parallel programs with nested loops and inter-thread coordination, it must guarantee the order of synchronization operations in an execution instance. In this paper, we propose an improved restructuring method that guarantee ordering execution instance and preserve the semantics of original program. This method requires O(np) time and (s + up) space, where n is the number of total operations, s is the number of synchronization operations and p is the number of parallelism in the execution. Also, this method makes on-the-fly detection of parallel program with nested loops and inter-thread coordination more easily in space and time complexity.
-
It is essential to develop the internetworking strategies between the OBP satellite B-ISDN and the terrestrial B-ISDN for the economical and efficient implementation of the future network infrastructure. We have considered the implementation issues of the emerging B-ISDN, especially interworking strategies of the terrestrial B-ISDN with the OBP satellite B-ISBN. We proposed interworking model between terrestrial B-ISDN and OBP satellite B-ISDN NNI signaling protocol, and describes the design and verification of the interworking protocol. For the verification, interworking protocol is modeled by Predicate/Action Net derived from Petri Net and the designed model is analyzed by reachability tree. Using Unix socket, the verified interworking protocol is implemented in two workstations and implemented interworking protocol is tested by local test method which is outstanding in error detection and recommended by ISO.
-
In this paper, we present an abstract object-oriented plat-form model .suitable for the real-time distributed telecommunication system. The proposed platform is constructed upon the extended version of the real-time, distributed operating system, SROS(Scalable Real-time Operating System), that is developed at ETRI and successfully operated in the ATM switching system for several years. The object-oriented software development and maintenance methodology will resolve the current software crisis in the area of telecommunication and switching systems due to the everlasting maintenance about the huge amount of the existing software and the ever increasing needs for the better and new communication services. In general, an object-oriented software platform realizes the object-oriented methodology and possesses many good aspects like high productivity, better reusability, easy maintenance, et at. The platform is also designed to present the distributed multimedia service in addition to real-time event delivery. Recently, we have been implementing a couple of prototype bated on the proposed platform. Reflecting the evaluation results from these prototypes, the final platform specification will be determined.
-
Recently, RoboCup soccer simulation has been regarded as a good benchmark problem for multiagent researches. Soccer agents have to make decision based on visual and auditory information, which are sent from the soccer server. In order to develop a strong team, we have to design decision-making process of each player agent. However, it is very difficult for us to design the decision-making processes in detail, because we don't know what actions of each player are effective for the team. In this paper, we attempt to apply co-evolutionary method, which is one type of analogies of evolution, to improve the team play. Agents have hand coded basic skills, which include dribble, shoot, pass etc. Agents already can play autonomously and independently. Individual agent skills are characterized by some parameters. By coevolving teams with these parameters, we obtained relatively interesting teams, in which players behave cooperatively in order to win the soccer game. From some experiments, we discuss what teams are evolved.
-
We present a novel graph labeling problem called Fibonacci edge labeling. The constraint in this labeling is placed on the allowable edge label which is the difference between the labels of endvertices of an edge. Each edge label should be (3m+2)-th Fibonacci numbers. We show that every Fibonacci tree can be labeled Fibonacci edge labeling. The labelings on the Fibonacci trees are applied to their embeddings into Fibonacci Circulants.
-
The most important issue in database security is correct concurrency control under the restrictive security policy. The goal of secure transaction management is to keep security and provide many concurrent users with the high availability of database. In this paper, we consider the security environment of multidatabase system with replicated data. The read-from relationship in the existed serializability is improper in security environment. So, we define new read-from relationship and propose new secure 1-copy quasi-seriailzability by utilizing this relationship and display some examples. This security environment requires both the existed local autonomy and the security autonomy as newly defined restriction. To solve covert channel problem is the most difficult issue in developing secure scheduling scheme. The proposed secure 1-copy quasi-serializability is very proper for global transactions in that this serializability not violates security autonomy and prevents covert channel between global transactions.
-
In this paper, we evaluate the throughput and delay performance of a wireless Local Area Network(WLAN) employing the OFDM-based IEEE 802.lla Medium Access Control(MAC) protocol by compute. simulations under wireless indoor. channel. Packet Error Rate(PER) is also investigated for the various Eb/No. It is shown that, with soft-decision Viterbi decoder, throughput and delay performance are close to those of error-free channel at Eb/No above 8dB and PER is about 2
${\times}$ 10$\^$ -5/ at Eb/No=10dB. -
In this paper we propose a new network called Dynamic network for symmetric block ciphers. Dynamic cipher has the property that the key-size, the number of round, and the plaintext-size are scalable simultaneously We present the method for designing secure Dynamic cipher against meet-in-the-middle attack and linear cryptanalysis. Also, we show that the differential cryptanalysis to Dynamic cipher is hard.
-
A new scheduling algorithm called the Adaptive Weighted Round Robin with Delay Tolerance (AWRR/DT) is presented. The proposed scheme can reduce the average delay of non-real-time (NRT) class while maintaining the QoS of real-time (RT) classes. Our scheme can also reflect the traffic fluctuation of networks with a small processing burden.
-
In this paper we present and compare two different spatio-temporal decorrelation learning algorithms for updating the weights of a linear feedforward network with FIR synapses (MIMO FIR filter). Both standard gradient and the natural gradient are employed to derive the spatio-temporal decorrelation algorithms. These two algorithms are applied to multichannel blind deconvolution task and their performance is compared. The rigorous derivation of algorithms and computer simulation results are presented.
-
This paper proposes a new voice service network architecture for initial IMT-2000 and describes the features of Voice Gateway which is a core entity of the proposed architecture. Also describes a system configuration of the prototype of the proposed architecture and software configuration of Voice Gateway in the prototype.
-
In this paper, we compare the major issues associated with TDMA and S-CDMA, which is planned to be adopted as a new cable modem technique for upstream channel. In particular, we mainly deal with the following 3 topics: MAC protocol, modem structure and BER performance comparison between TDMA and S-CDMA.
-
In this paper, we analyze the channel estimation method by using Reference symbols for burst OFDM transmission systems. We set some parameters (the number of Reference symbols, the pilot spacing in Reference symbols, the update constant of equalizer coefficients) to evaluate their performance in the fixed multipath fading channel as like indoor environment.
-
In this paper, a new lateral offset estimation method, based on image processing techniques, is proposed for driver assistant system. A new description on lane markings in the image plane is presented, and its properties are discussed and used to detect lane markings. Multi-frame lane detection and analysis are adopted to improve the proposed lateral control method. An algorithm for obstacle detection is also developed. Experimental results show that the proposed method performs lateral control effectively.
-
Traffic monitoring plays an important role in intelligent transportation systems. It can be used to collect real-time traffic data concerning traffic flow. Passive shadows resulted from roadside buildings or trees and active shadows caused by moving vehicles, are one of the factors that arise errors in vision based vehicle detection. In this paper, a land mark based method is proposed for vehicle detection and shadow rejection, and finally vehicle count are achieved based on the land mark detection method.
-
The recognition system of a car plate is largely classified as the extraction and recognition of number plate. In this paper, we extract the number plate domain by using a thresholding method as a preprocess step. The computation of the density in a given mask provides a clue of a candidate domain whose density ratio corresponds to the properties of the number plate obtained in the best condition. The contour of the number plate for the recognition of the texts of number plate is extracted by operating Kohonen Algorithm in a localized region. The algorithm reduces noises around the contour. The recognition system with the density computation and Kohonen Algorithm shows a high performance in the real system in connection with a car number plate.
-
Marine chlorella (Nannochloropsis oculata) is cultivated at the fish farming association of experimental fishery laboratory. In the culture of the chlorella, it is necessary to count the number of chlorella in order to understand the condition of increase. For that purpose, we develop automatic chlorella counter using the image processing and the neural network. Its effectiveness is confirmed through the experiment.
-
As we review the mechanism regarding digital font generation and birth of TrueType font, we realizes that the process is composed of sequential steps such as contour fonts from glyph table. This fact implies that we propose classification of TrueType font in terms of segment width and the number of occurrence from the glyph data.
-
There are many methods that extract the depth information based on the blurring ratio for object point in DFD(Depth from Defocus). However, it is often difficult to measure the depth of the object in two-dimensional images that was affected by various elements such as edges, textures, and etc. To solve the problem, new DFD method employing the texture classification with a neural network is proposed. This method extracts the feature of texture from an evaluation window in an image and classifies the texture class. Finally, It allocates the correspondent value for the blurring ratio. The experimental result shows that the method gives more accurate than the previous methods.
-
The correspondence problem is known to be difficult to solve because false positives and false negatives almost always exist in real image sequences. In this paper, we propose a robust feature tracking algorithm considering incomplete trajectories such as entering and/or vanishing trajectories. We solve the correspondence problem as the optimal graph search problem, by considering false feature points and by properly reflecting motion characteristics. The proposed algorithm finds a local optimal correspondence so that the effect of false feature points can be minimized in the decision process. The time complexity of the proposed graph search algorithm is given by O(mn) in the best case and O(m
$^2$ n) in the worst case, where m and n are the number of feature points in two consecutive frames. The proposed algorithm can find trajectories correctly and robustly, which has been shown by experimental results. -
In this paper, a new hierarchical motion estimation (ME) scheme using the wavelet transformed multi-resolution image layers is proposed. While the coarse-to-fine (CtF) ME, used in previously proposed coding schemes, can provide a better estimate at the coarsest resolution, it is difficult to accurately track motion at finer resolution. On the other hand, in fine-to-coarse (FtC) ME, it can solves this local minima problem by estimating motion track at the finest subband and propagating the motion vector (MV) to coarser subband. But this method causes to higher computational overhead. This paper proposes a new method for reducing the computational overhead of fine-to-coarse rnulti-resolution motion estimation (MRME) at the finest resolution level by searching for the region to consider motion vectors of the coarsest resolution subband.
-
It this paper a VLSI architecture of the Shape-Adaptive Discrete Cosine Transform (SA-DCT) is described, which can be employed dedicatedly for MPEG-4 video codec. Adopting a fast DCT algorithm, the number of multipliers can be reduced by half in comparison with a conventional algorithm. This SA-DCT core with a small additional amount of hardware can perform the SA-Inverse DCT (SA-IDCT) by sharing multipliers and a transportation memory. The proposed SA-DCT core is integrated with 40,000 gates by using 0.35
$mu$ m triple-metal CMOS technology, which operates at 20 Mhz, and hence enables the realtime codec of CIF ($352{\times}288$ pixels) pictures. -
As the growth of internet and the diffusion of wide multimedia applications are increased, the ownership verification and authentication in communication channel for a digital image become more important. For these purpose there are many watermarking scheme available for image, video stream and audio data. In this paper we studied on techniques for integrity and authentication of digital images and proposed new watermarking algorithm. The proposed algorithm is implemented in C language on IBM-PC and the test results are shown.
-
The merit of the stroke extraction algorithm is the ease of the feature abstraction from the skeleton of a character, But, extracting strokes from Korean characters has two major problems that must be dealt with. One is extracting primitive strokes and the other is merging or splitting the strokes using dynamic information of the strokes. In this paper, a method is proposed to extract strokes from an off-line handwritten Korean character. We have developed some stroke segmentation rules based on splitting, merging and directional analysis. Using these techniques, we can extract and trace the strokes in an off-line handwritten Korean character accurately and efficiently.
-
Motion detection is an important step in computer vision and image processing. Traditional motion detection systems are classified into two categories, namely, feature based and gradient based. In feature based motion detection, features in consecutive frames are detected and matched. Gradient based methods assume that the intensity varies linearly and locally. The method, which we propose, is neither feature nor gradient based but uses the electric field theory. The pixels in an image are modeled as point charges and motion is detected by using the variations between the two electric fields produced by the charges corresponding to the two images.
-
In this paper, we propose the method using PCA(principal component analysis) algorithm when proposed algorithm performs multimedia information indexing. After we extract DC coefficients of DCT from MPEG video stream which is an international standard of moving picture compression coding, we apply PCA algorithm to image made of DC coefficients and extract the feature of each DC image. Using extracted features, we generate codebook and perform multimedia information indexing. The proposed algorithm Is very fast when indexing and can generate optimized codebook because of using statistical feature of data
-
The sign-language tan be used a9 an auxiliary communication means between avatars of different languages. At that time an intelligent communication method can be also utilized to achieve real-time communication, where intelligently coded data (joint angles for arm gestures and action units for facial emotions) are transmitted instead of real pictures. In this paper we design a gesture-emotion keyframe editor to provide the means to get easily the parameter values. To calculate both joint angles of the arms and the hands and to goner-ate the in keyframes realistically, a transformation matrix of inverse kinematics and some kinds of constraints are applied. Also, to edit emotional expressions efficiently, a comic-style facial model having only eyebrows, eyes nose, and mouth is employed. Experimental results show a possibility that the editor could be used for intelligent sign-language image communications between different lan-guages.
-
Popular methods for extracting a text region in video images are in general based on analysis of a whole image such as merge and split method, and comparison of two frames. Thus, they take long computing time due to the use of a whole image. Therefore, this paper suggests the faster method of extracting a text region without processing a whole image. The proposed method uses line sampling methods, FFT and neural networks in order to extract texts in real time. In general, text areas are found in the higher frequency domain, thus, can be characterized using FFT The candidate text areas can be thus found by applying the higher frequency characteristics to neural network. Therefore, the final text area is extracted by verifying the candidate areas. Experimental results show a perfect candidate extraction rate and about 92% text extraction rate. The strength of the proposed algorithm is its simplicity, real-time processing by not processing the entire image, and fast skipping of the images that do not contain a text.
-
A new and modified neural network model Is proposed for CT image reconstruction from four projection directions only. The model uses the Resilient Back-Propagation (Rprop) algorithm, which is derived from the original Back-Propagation, for adaptation of its weights. In addition to the error in projection directions of the image being reconstructed, the proposed network makes use of errors in pixels between an image which passed the median filter and the reconstructed one. Improved reconstruction was obtained, and the proposed method was found to be very effective in CT image reconstruction when the given number of projection directions is very limited.
-
An optical flow-based motion estimation algorithm is proposed for video coding. The algorithm uses block-matching motion estimation with an adaptive search region. The search region is computed from motion fields that are estimated based on the optical flow. The algorithm is based on the fact that true block-motion vectors have similar characteristics to optical flow vectors. Thereafter, the search region is computed using these optical flow vectors that include spatial relationships. In conventional block matching, the search region is fixed. In contrast, in the new method, the appropriate size and location of the search region are both decided by the proposed algorithm. The results obtained using test images show that the proposed algorithm can produce a significant improvement compared with previous block-matching algorithms.
-
This paper proposes an image compressing and template matching algorithm for face image using GHA (Generalized Hebbian Algorithm). GHA is a part of PCA (Principal Component Analysis), that has single-layer perceptrons and operates and self-organizing performance. We used this algorithm for feature extraction of face shape, and our simulations verify the high performance for the proposed method. The shape for face in the fact that the eigenvector of face image can be efficiently represented as a coefficient that can be acquired by a set of basis is to compress data of image. From the simulation results, the mean PSNR performance is 24.08[dB] at 0.047bpp, and reconstruction experiment shows that good reconstruction capacity for an image that not joins at leaning.
-
Digital halftoning is a technique to make an equivalent binary image from scanned photo or graphic images. Low pass filtering characteristic of human visual system can be applied to get the effect of spatial averaging of local area consisted of black and white pixels for gray image. The overlapping of black dot decreases brightness and black dot is very sensitive to human visual system in the bright region. In this paper, for gray-level expression, only bright gray region in the color image is considered for blue noise mask (BNM) approach. To solve this problem, BNM with CMY dot is used for the bright region instead of black dot. Dot-on-dot model with single mask causes the problem making much black dot overlap, color distortion. Therefore approach with three masks for C, M and Y each is proposed to decrease pixel overlap and color distortion.
-
This paper presents a new watermarking method based on wavelet transform. Embedding algorithm call define robust area by varying thresholds and gives a watermark image the priority of significance by analyzing spatial correlation of the watermark image. Detector can adjust thresholds to the distorted watermarked image. Also detector can extract the embedded data without an original image. A new measurement for detecting the correct watermark is suggested. Simulation results show that the embedded watermark is robust against various signal processing and compression attacks.
-
This paper aims to establish fundamentals of measuring and evaluating the performance of water-marking systems. We first present the general model of a watermarking method for still images. Based on this model, we propose a statistical method of measuring the performance and robustness of the watermarking system. Then, the DCT-based watermarking system is analyzed and its performance is evaluated by using the proposed method.
-
In this paper we derive a new VAD algorithm, which combines the preprocessing algorithm and the optimum decision rule. To improve the performance of the VAD algorithm we employ the speech enhancement algorithm and then apply the maximal ratio combining technique in the preprocessing procedure, which leads to maximized output SNR. Moreover, we also perform extensive computer simulations to demonstrate the performance improvement of the proposed algorithm under various background noise environments.
-
Although many content-based image retrieval systems using shape feature have tried to cover rotation-, position- and scale-invariance between images, there have been problems to cover three kinds of variance at the same time. In this paper, we introduce new approach to extract shape feature from image using MBR(Minimum Bounding Rectangle). The proposed method scans image for extracting MBR information and, based on MBR information, compute contour information that consists of 16 points. The extracted information is converted to specific values by normalization and rotation. The proposed method can cover three kinds of invariance at the same time. We implemented our method and carried out experiments. We constructed R*_tree indexing structure, perform k-nearest neighbor search from query image, and demonstrate the capability and usefulness of our method.
-
The information-theoretic approach to face recognition is based on the compact coding where face images are decomposed into a small set of basis images. Most popular method for the compact coding may be the principal component analysis (PCA) which eigenface methods are based on. PCA based methods exploit only second-order statistical structure of the data, so higher- order statistical dependencies among pixels are not considered. Independent component analysis (ICA) is a signal processing technique whose goal is to express a set of random variables as linear combinations of statistically independent component variables. ICA exploits high-order statistical structure of the data that contains important information. In this paper we employ the ICA for the efficient feature extraction from face images and show that ICA outperforms the PCA in the task of face recognition. Experimental results using a simple nearest classifier and multi layer perceptron (MLP) are presented to illustrate the performance of the proposed method.
-
In this paper, we develop an algorithm of soccer image sequences mosaicing using reverse affine transform. The continuous mosaic images of soccer ground field allows the user/viewer to view a “wide picture” of the player’s actions The first step of our algorithm is to automatic detection and tracking player, ball and some lines such as center circle, sideline, penalty line and so on. For this purpose, we use the ground field extraction algorithm using color information and player and line detection algorithm using four P-rules and two L-rules. The second step is Affine transform to map the points from image to model coordinate using predefined and pre-detected four points. General Affine transformation has many holes in target image. In order to delete these holes, we use reverse Affine transform. We tested our method in real image sequence and the experimental results are given.
-
Foveated vision has the big advantage of exhibiting a wide field of view, along with a high resolution fovea. However, in the case of using optical flow, foveated vision kas one demerit. The demerit is a concentrate of optical flow. For foveated vision, an object moves almost only around the center of the field. In this paper, we suggest how to segment motion of some objects, and how to discriminate a hand and another object. In the future, the method we suggested may be useful for recognizing human actions by foveated vision.
-
Among the previous searching methods, there are the typical methods such as full search and three-step search, etc. Block motion estimation using exhaustive search is too computationally intensive. To apply in practice, recently proposed fast algorithms have been focused on reducing the computational complexity by limiting the number of searching points. According to the reduction of searching points, the quality performance is aggravated in those algorithms. In this paper, We present a fast and efficient search algorithm for block motion estimation that produces better quality performance and less computational time compared with a three-step search (TSS). Previously the proposed Two Step Search Algorithm (TWSS) by Fang-Hsuan Cheng and San-Nan sun is based on the ideas of dithering pattern for pixel decimation using a part of a block pixels for BMA (Block Matching Algorithm) and multi-candidate to compensate quality performance with several locations. This method has good quality performance at slow moving images, but has bad quality performance at fast moving images. To resolve this problem, the proposed algorithm in this paper considers spatial and temporal correlation using neighbor and previous blocks to improve quality performance. This performance uses neighbor motion vectors and previous motion vectors in addition, thus it needs more searching points. To compensate this weakness, the proposed algorithm uses statistical character of dithering matrix. The proposed algorithm is superior to TWSS in quality performance and has similar computational complexity
-
In this paper, a method to detect lanes and obstacles from the images captured by a CCD camera fitted in an automobile is proposed, and a new terminology “Moving Window” is defined. Processing the input dynamic images in real time can cause quite a few constraints in terms of hardware. In order to overcome these problems and detect lanes and obstacles in real time using the images, the optimal size of “Moving Window” is determined, based upon road conditions and automobile states. The real time detection is made possible through the technique. For each image frame, the moving window is moved in a predicted direction, the accuracy of which is improved by the Kalman filter estimation. The feasibility of the proposed algorithm is demonstrated through the simulated experiments of freeway driving.
-
In this paper, we present a content-based image retrieval method that is less sensitive to some rotations and translations of an image by using the fuzzy region segmentation. The algorithm retrieves similar images from a database using the two features of color and color spatial information. To index images, we use the average coordinates of color distribution to obtain the spatial information of each segmented region. Furthermore, we also propose the alternative to the ripple phenomenon, which is occurred in the conventional fuzzy region segmentation algorithm.
-
A new 2-D block Kalman filtering method which uses a nonlinear function is presented to generate a more accurate filtered estimate of a range image that has been corrupted by additive noise. Novel 2-D block Kalman filtering method is constructed of the conventional method and nonlinear function which utilizes to control estimation error. We show that novel 2-D Kalman filtering method using a nonlinear function is effective at reducing the additive noise, not distorting shape edges.
-
Because of the rapid growth of Internet and multimedia applications, how to protect IPR (intellectual property rights) has become a critical issue. Is one of the ways to overcome the problem of the protection of IPR. Digital watermarking call be applied to multimedia data, such as digital images, digital video, and digital audio. In this paper, we propose a digital watermarking technique for digital images to authenticate an owner or an image by embedding visually recognizable patterns, such as logos, signatures, or stamps into images In BDCT (block discrete cosine transform) frequency domain. The proposed method sorts the components of an original image twice. At the same time, the method, also, rearranges the components of a watermark twice in order to be more robust, and finally embeds the watermark into the image. From the experimental results, the conjunction of three similarity measurements shows that our proposed method is robust to image cropping, image filtering, and JPEG (the Joint Photographic Experts Group) both subjectively and objectively.
-
Conventional caption extraction methods use the difference between frames or color segmentation methods from the whole image. Because these methods depend heavily on heuristics, we should have a priori knowledge of the captions to be extracted. Also they are difficult to implement. In this paper, we propose a method that uses little heuristics and simplified algorithm. We use topographical features of characters to extract the character points and use KMST(Kruskal minimum spanning tree) to extract the candidate regions for captions. Character regions are determined by testing several conditions and verifying those candidate regions. Experimental results show that the candidate region extraction rate is 100%, and the character region extraction rate is 98.2%. And then we can see the results that caption area in complex images is well extracted.
-
In this paper, we propose an improved SBIHT algorithm based on double significance criteria. According to the defined relationship between a threshold and a boundary rate-distortion slope, we choose significant coefficients and trees. The selected significant coefficients and trees are quantized and entropy-coded. Experimental results demonstrate that the boundary rate-distortion slope is well adapted and the proposed algorithm is quite competitive to and often outperforms the SPIHT algorithm.
-
In this paper, a next generation high speed QPSK transmitter is designed based on 1.8
${\mu}$ m design rule. The designed transmitter supports the MPEG2-TS coded packed data for the DAVIC standard. Transmitter is composed of the convolutional coder, the shortened Reed-Solomon coder, and QPSK modulator. The coded packets are modulated in APSK with an RC filter. Especially, Galois Field multiplier with a standard basis is designed with the pipelined parallel architecture. Also, in the QPSK modulator, the RC filter and mixer are simplified into the ROM table, which can improve the performance of the transmitter. The total number of gates for the implemented baseband transmitter is 26,875. -
A robust optical security technique using ortho-gonally polarized lights in the interferometer is proposed. We use orthogonally polarized lights in order to minimize the noise generated by the refractive index change due to vibration, flow of air, change of temperature etc. To make orthogonally polarized lights the first beam splitter in the Mach-Zehnder interferometer is substituted by a polarizing beam splitter(PBS). Because of incoherence of orthogonally polarized lights, the noise generated by the change of refractive index is minimized. To encrypt an image we use the random partition and the diffusing of pixel. Finally we make Phase-only-filters of each image which is randomly partitioned and diffused pixel by pixel. Simulation results show the proposed system has the ability of encryption and decryption of an image.
-
This paper concerned with the patterns of foot-floor contact and electromyography activities of the lower extremity of the body during the termination of human gait. The termination of human gait is defined as the transition from a steady-state gait to a quiet standing posture. The transition between these two states has not been extensively studied and defined. There appears to be a critical period in the gait cycle that the decision to terminate gait or continue to take an additional step must be made.
-
Visual features of lip area play an important role in the visual speech information. We are concerned about correct lip area as region of interest (ROI). In this paper, we propose a robust and fast method for locating the mouth corners. Also, we define a region of interest at mouth during speech. A method, which we have used, only uses the horizontal and vertical image operators at mouth area. This searching is performed by fitting the ROI-template to image with illumination control. Most of the lip extraction algorithms are dependent on luminosity of image. We just used the binary image where the variable threshold is applied. The variable threshold varies to illumination condition. In order to control those variations, the gray-tone is converted to binary image by threshold, which is obtained through Multiple Linear Regression Analysis (MLRA) about divided 2D special region. Thus we obtained the region of interest at mouth area, which is the robust extraction about illumination. A region of interest is automatically extracted.
-
N-channel poly-Si TFT, processed by Solid Phase Crystalline(SPC) on a glass substrate, has been investigated by measuring its electrical properties before and after stressing. It is observed that the threshold voltage shift due to electrical stress varies with various stress conditions. Threshold voltages measured in 1.5um and 3um poly-Si TFT’s are 3.3V, 37V respectively. With the threshold voltage shift, the degradation of transconductance and subthreshold swing is also observed.
-
This paper describes expandable 4 bit ALU IC using adiabatic and dynamic CMOS circuit technique. It was designed so that the integrated circuit may have the function which is equivalent to HC181 which is CMOS standard logic IC for the comparison, and it was fabricated using a standard 1.2
${\mu}$ CMOS process. As the result, the IC has shown that it operates perfectly on all function modes. The power dissipation is 2 order lower than that of HC 181. -
This paper proposes, for the first time, the design of class I pull-push power amplifier. With the new design, the output power is increased by four times when compared to conventional single-end class I connection amplifier with the same supply voltage. The performance of the proposed amplifier is verified by with a 100-kHz power amplifier constructed using general-purpose NPN transistors.
-
The coupling properties of supermodes guided by grating-assisted directional couplers (GADCs) can be phrased in rigorous modal theory. Such a modal solution for TE modes expressed by simple electrical transmission-line networks is utilized to analyze the power distribution of GADCS with three guiding channels. In particular, the modal transmission-line theory can serve as a template for computational algorithms that systematically evaluate the coupling efficiency that are not readily obtained by other methods.
-
A low power 10bit current-mode folding and interpolating CMOS analog to digital converter (ADC) with arithmetic folding blocks is presented in this paper. A current-mode two-level folding amplifier with a high folding rate (FR) is designed not only to prevent ADC from increasing a FR excessively, but also to perform a high resolution at a single power supply of 3.3V The proposed ADC is implemented by a 0.6
${\mu}$ m n-well CMOS single poly/double metal process. The simulation result shows a differential nonlinearity (DNL) of${\pm}$ 0.5LSB, an integral nonlinearity (INL) of${\pm}$ 1.0LSB -
Application specific DSPs often employ irregular datapath structures with distributed registers. In the scheduling phase of retargetable compilation, resolution of register usage conflicts comes to be a new constraint for such datapaths. This paper presents a method of register constraint analysis which attempts to minimize the number of the spill codes required for resolving the register usage conflicts. It searches for a set of ordering restrictions among operations which sequentialize the lifetimes of the values residing in the same register as much as possible and thus minimize the number of the register conflict. Experimental results show that a combination of the proposed register constraint, analysis and list-based scheduling reduces the number of the register spills into 25%.
-
A novel extraction method of high frequency small-signal model parameters for MOSFETS is proposed. From S-parameter measurement, this technique accurately extracts the model parameters including the charge conservation capacitance parameters. To consider charge conservation, nonreciprocal capacitance is considered. The modeled parameters fit the measurements very well without any optimization.
-
With the advance of wireless communications technology, mobile communications has become more convenient than ever. However because of the openness of wireless communications, how to protect the privacy between communicating parties is becoming a very important issue. In this paper an authentication and encryption algorithm of the GSM network for roaming user is proposed. In the proposed algorithms, we use a new hash function for user authentication and LFSR (Linear Feedback Shift Register) based stream cipher for message encryption and decryption. Each algorithm is programmed with C language and simulated on IBM-PC system and we analyze the randomness properties of the developed algorithm using statistical analysis.
-
We develop the Multi-Mobile-agents system for realizing effective cooperative task processing in the network environment. In this system, agents are separated / fused by the Place and migrated to another computer. A Place can assign agents to other places by agents migration to be flat the time to execute agents’ action. In this paper, the effectiveness of this system is shown by experimental results applying an agent given simple task.
-
This paper proposes 1.5V-3GHz CMOS PLL with a new delay cell for operating in high frequency and multi chained two stage VCO to improve phase noise performance. The proposed multi-chained architecture is able to reduce a timing jitter or a transition spacing and the newly VCO is operating in high frequency. The PFD circuit designed to prevent fluctuation of charge pump circuit under the locking condition. Simulation results show that the tuning range of proposed VCO is wide at 1.8GHz-3.2Ghz and power dissipation is 0.6mW.
-
This paper proposes a new polarization diversity scheme for OPFDM (Orthogonal Polarization and Frequency Division Multiplexing). OPFDM is an extension of OFDM (Orthogonal Frequency Division Multiplexing) in conjunction with polarization multiplexing in order to ensure the orthogonality amongst subcarriers. Since OPFDM uses two orthogonally polarized channels, it can easily employ the polarization diversity. In order to get the diversity gain effectively in a frequency selective fading channel, the proposed scheme combines the signals in subcarrier-by-subcarrier basis. The computer simulation results confirm that the proposed scheme is superior to conventional one in the two orthogonally polarized two-ray Rayleigh fading channels with cross-talk between the two channels.
-
The traditional client-server model RPC and mobile agents have been used for interprocess communication between processes in different hosts. The performances of two mechanisme were analyzed in the literature [4, 6, 9]. But the security services which extensively affect the performance of systems because of low speed have not been considered. We propose two performance models considering the security services for the RPC and the mobile agent Through the analysis of the models, we show that the execution time of the mobile agent takes less than the RPC In the environment considering security services.
-
This paper presents channel estimation of an asynchronous W-CDMA reverse link using the interpolation and moving average algorithm in frequency-selective Rayleigh fading channel. The proposed algorithm is an interpolated decision-directed (IDD) block-wise moving average (BWMA) algorithm. The IDD-BWMA algorithm performs two- stage processes. The first stage performs data decision to make a virtual pilot channel by using linear interpolation channel estimation scheme. Then, the second stage performs the channel estimation of the “block-wise moving average” type by using a virtual pilot channel obtained in the first stage. By using Monte-Carlo computer simulations, we show that the proposed channel estimator is superior to other estimation schemes such as the WMSA(K=1) and DD-RAKE at higher Doppler frequencies, especially.
-
The traditional method to construct Geographic Information System (GIS) is to scan the published maps, then the important and difficult step is to digitize the maps data. It costs a lot of time and human resource. Because a Global Positioning System (GPS) can offer high accurate digital signal directly, we developed a new method that uses the GPS to construct the GIS.
-
The design of LAI(Local Area Identifier), the first paging area for searching the mobile terminal has a close relation with the performance of paging channel in CDMA cellular network. This paper discusses the performance of the forward channel of IS-95 CDMA standard, known as the paging through the related messages such as call control message, channel assignment message. Modeling and simulation work were conducted to quantify the performance of paging channel in terms of traffic handling capacity and blocking levels. This result serves as illustrative guidelines for the proper engineering of common control channel, which has a major impact on the overall performance of cellular network.
-
Seo, Young-Soo;Hwang, Lak-Hoon;Cho, Moon-Taek;Ho bin Song;Lee, Chun-Sang;Sang-Yong;Park, Ki-Soo 997
The purpose of this paper is to verify the appropriation of power electronics circuit by applying the most powerful and widely used simulator PSPICE and SIMULINK for adapted variable control technics. Power electronics librarys modeled and adapted to circuit. It is proved that simulation and excute are almost same. -
RFID system is applied to identify, locate and track people, cars, animals. In RFID system, the passive transponder without battery has some benefits than active transponder, such as no restriction in battery exchange and in battery’s life. But it needs auxiliary RF-DC conversion circuit. RF-DC conversion circuit originated from Wireless Power Transmission (WPT). In this paper, RF-DC conversion circuit consists of a microstrip patch antenna and impedance matching circuit, Cock-croft Walton circuit. And RF-DC conversion circuits have two kinds of T-type and Cross-type impedance matching circuits.
-
This paper presents a simple method to estimate short-circuit power dissipation and propagation delay for static CMOS logic circuits. Short-circuit current expression is derived by accurately interpolating peak points of actual current curves which is influenced by the gate-to-drain coupling capacitance. The macro model and its expressions estimating the delay of CMOS circuits, which is based on the current modeling expression, are also proposed after investigating the voltage waveforms at transistor output modes. It is shown through simulations that the proposed technique yields better accuracy than previous methods when signal transition time and/or load capacitance decreases, which is a characteristic of the present technological evolution.
-
In this paper, we have designed and fabricated power PHEMT’s with an unit gate width of 80
$\mu\textrm{m}$ and 4 fingers, and MIMIC power amplifiers using the PHEMT’s as well. The PHEMT’s have a 0.2$\mu\textrm{m}$ gate length and source to drain spacing of 3$\mu\textrm{m}$ . The characteristics of the fabricated PHEMT’s are 4.08dB of S$\sub$ 21/ gain at the 35GHz and 317mS/mm of gm, and 62GHz of f$\sub$ T/ and 120GHz of f$\sub$ max/. The designed and fabricated MIMIC’s power amplifiers with 6 PHEMT’s and MIN capacitors were fully passivated by 1000 Α of Si$_3$ N$_4$ film for higher performance and surface protects. The chips were processed using the MINT processes, and size was 3.25${\times}$ 1.8$\textrm{mm}^2$ . The fabricated MIMIC power amplifiers have RF characteristics such as 11.25dB of S$\sub$ 21/ gain, 11.37dB of input return-loss and 12.69dB of output return-loss at the 34.55GHz. -
Seo, Young-Soo;Lee, Chun-Sang;Hwang, Lak-Hoon;Kim, Jong-Lae;Byong gon Jang;Kim, Joo-Lae;Cho, Moon-Tack;Park, Ki-Soo 1013
In this study, the estimate speed of rotor in the induction motor with Model Reference Adaptive control System (MARC) principle and to study that vector control system feedbacks speed estimated to speed control system and its result is as follows; Considering with explanation an influence of speed estimation mechanism depend on error about the second resistance size established, it estimates the deviation of the second resistance establishment and exhibits a compensation method, what is more, it designs a reparation program using the fuzzy algorithm and testifies the result with the computer simulation. And besides, it composes the load torque estimation and estimates the load torque, as the result, feedback-compensating the result of estimation, it improves the efficiency. In consequence, it makes a good result for more powerful vector control system about the outside trouble. -
In this paper, a CNN using 1-dimensional chaos circuits with controllable nonlinear functions is proposed. The proposed CNN consists of
$\p{times}q$ chaos circuits which are called cell circuits. The nonlinear functions of the cell circuits can be controlled by employing fuzzy scheme. Thanks to the controllability of the nonlinear functions, the proposed circuit can adjust transition behavior of the CNN electronically. Furthermore, the chaotic behavior of the cell circuit which is a portion of the proposed CNN is simple since the cell circuit is a 1-dimensional chaos circuit. To confirm the validity of the circuit design, SPICE simulations were performed concerning the proposed CNN. -
In this paper, a neuro-fuzzy system for quantitative characterization of chaotic signals is proposed. The proposed system is differ from the previous methods in that the nonlinear functions of the nonlinear dynamical systems are calculated as the invariant factor. In the proposed neuro-fuzzy system, the nonlinear functions are determined by supervised learning. From the reconstructed nonlinear functions, the proposed system can generate extrapolated chaotic signals. This feature will help the study of nonlinear dynamical systems which require large number of chaotic data. To confirm the validity of the proposed system, nonlinear functions are reconstructed from 1-dimensional and 2-dimensional chaotic signals.
-
In this paper, we apply to a genetic algorithm for fuzzy clustering. We propose initialization procedure and genetic operators such as selection, crossover and mutation, which are suitable for solving the problems. To illustrate the effectiveness of the proposed algorithm, we solve the manufacturing cell formation problem and present computational comparisons to generalized Fuzzy c-Means algorithm.
-
A neuro-fuzzy based circuit to recognize circuit pat-terns is proposed in this paper. The simple algorithm and exemption from the use of template patterns as well as multipliers enable the proposed circuit to implement on the hardware of an economical scale. Furthermore, thanks to the circuit design by using current-mode techniques, the proposed circuit call achieve easy extendability of tile circuit and efficient pattern recognition with high-speed. The validity of the proposed algorithm and tile circuit design is confirmed by computer simulations. The proposed pattern recognition circuit is integrable by a standard CMOS technology.
-
A distributed stable marriage problem in extended in this paper. The traditional approach related to the stable matching problem assume that preference lists are fixed. However, in decentralized version this assumption is not reasonable because of the autonomy of members. In this paper, we consider the situation that a preference list can be varied at some stable matching and show the condition to be broken the stability of the original matching. Moreover, we propose a stabilization algorithm to obtain a stable matching by execution with a minimal set of members.
-
We introduce the forecasting method for a next day electric peak load that uses the optimal combination of two types of neural networks. First network uses learning data that are past 10days of the target day. We name the neural network Short Term Neural Network (STNN). Second network uses those of last year. We name the neural network Long Term Neural Network (LTNN). Then we get the forecasting results that are the linear combination of the forecasting results by STNN and the forecasting results by LTNN. We name the method Combination Forecasting Method (CFM). Then we discuss the optimal combination of STNN and LTNN. Using CFM of the optimal combination of STNN and LTNN, we can reduce the forecasting error.
-
The enhancement to the back-propagation algorithm presented in this paper has resulted from the need to extract sparsely connected networks from networks employing product terms. The enhancement works in conjunction with the back-propagation weight update process, so that the actions of weight zeroing and weight stimulation enhance each other. It is shown that the error measure, can also be interpreted as rate of weight change (as opposed to
${\Delta}W_{ij}$ ), and consequently used to determine when weights have reached a stable state. Weights judged to be stable are then compared to a zero weight threshold. Should they fall below this threshold, then the weight in question is zeroed. Simulation of such a system is shown to return improved learning rates and reduce network connection requirements, with respect to the optimal network solution, trained using the normal back-propagation algorithm for Multi-Layer Perceptron (MLP), Higher Order Neural Network (HONN) and Sigma-Pi networks. -
This paper presents the application of the wavelet transform analysis and the neural network method to the phonocardiogram (PCG) signal. Heart sound is a acoustic signal generated by cardiac valves, myocardium and blood flow and is a very complex and nonstationary signal composed of many source. Heart sound can be discriminated normal heart sound and heart murmur. Murmurs have broader frequency bandwidth than the normal ones and can occur at random position of cardiac cycle. In this paper, we classified the group of heart sound as normal heart sound(NO), pre-systolic murmur(PS), early systolic murmur(ES), late systolic murmur(LS), early diastolic murmur(ED). And we used the wavelet transform to shorten artifacts and strengthen the low level signal. The ANN system was trained and tested with the back- propagation algorithm from a large data set of examples-normal and abnormal signals classified by expert. The best ANN configuration occurred with 15 hidden layer neurons. We can get the accuracy of 85.6% by using the proposed algorithm.
-
In this paper, an efficient method to find cut in the MPEG stream data is proposed. For this purpose, histogram difference and pixel difference is considered as a noise signal. The signal is then filtered out by a median filter to make the frame difference larger. The frame difference obtained in this way is classified into cut frame and non-cut frame by the 2-means clustering without using any threshold value. To improve the classification ratio, a back-propagation neural network is constructed, where outputs of 2-means clustering are used as the inputs of the network. The simulation results demonstrate the performance of the proposed methods.
-
In general, neural networks based modeling involves trying multiple networks with different architectures and/or training parameters in order to achieve the best accuracy. Only the single best-trained neural network is chosen, while the rest are discarded. However, using only the single best network may never give the best solution in every situation. Many researchers, therefore, propose methods to improve the accuracy of neural networks based modeling. In this paper, the idea of the logical combinations of neural networks is proposed and discussed in detail. The logical combination is constructed by combining the corresponding outputs of the neural networks with the logical “And” node. The experimental results based on simulated data show that the modeling accuracy is significantly improved when compared to using only the single best-trained neural network.
-
Infrared (IR) seeker identifies the location of a target by detecting the infrared energy radiated from the target, and enables the missile to track the target. To improve the tracking performance, a counter- countermeasure (CCM) is essential to minimize the effect of the countermeasure (CM), which is operated by a target to protect itself. In this paper, we propose a crossed array tracker (CAT) using two-color CCM algorithm. The CAT using the proposed algorithm shows better tracking performance by minimizing the effect of CM.
-
ln this paper, a new active phase shifter is proposed using a vector sum method, and it is shown that the proposed phase shifter is more efficient than the others in size, power, number of circuits, and gain. Also a unique digital phase control method of the circuit is suggested. The proposed scheme was designed and implemented using a Wilkinson power combiner/divider, a branch line 3dB quadrature hybrid coupler and variable gain amplifiers (VGAs) using dual gate FETs (DGFETs). Furthermore, it is also shown that the proposed scheme is more efficient and works properly with the digital phase control method.
-
This paper presents a new 3-D ray tracing technique based on the image theory with newly defined ray tubes. The proposed method can be applied to indoor environments with arbitrary building layouts and has high computational efficiency compared to the precedent methods resorting to the ray launching scheme. Its predictions are in good agreement with the measurements
-
Analytic series solution for the problem of transverse magnetic (TM) scattering by an elliptic dielectric cylinder loaded slot is presented for an electric line source illumination. The solution is based on using matching functions and mode matching technique (MMT) and it converges very fast.
-
In this paper, a simplified visualization method is proposed for an urban space in consideration of weather and sun moving. In the proposed method, buildings and roads with shadows are visualized by the ray tracing algorithm. Also sky, snow, and rain are visualized by textures. Some textures such as snow and rain are generated in advance by the ray casting algorithm. Then we can obtain images with weather condition and shadows of sunlight by buildings along the road in relatively low computational cost
-
In this paper, we show that a variation in sampling rate give rise to system performance degradation and propose a method to effectively reduce the error. We first capture the variation as a first order autoregressive (AR) model and project it as an additional sensor measurement noise. By considering that the sensor measurements include correlated noise, we perform a decorrelation process and then apply a standard Kalman filter (SKF) to estimate the target-state. As a result of the two-step procedure, we achieve a significant reduction in the target state estimation error.
-
This paper presents a new approach to evaluate the maximum number of simultaneous switching gates of a given combinational circuit. The new approach is based on an iterative method proposed by Sinogi et al. and applies a simulated annealing strategy to search jot a new solution. The experimental evaluation using ISCAS’85 benchmark circuits shows that the proposed approach has attained an excellent improvement compared with other rotated methods including the iterative method.
-
Superquadrics can represent various and complex 3D objects with only some parameters(size, position, deformation etc.). So if we use both superquadrics and deformed superquadrics, we can also represent more realistic 3D objects which are existed in real world. In this paper we use the z-buffer algorithm and stencil buffer together because this is very useful when the superquadric primitives are combined. The fundamental ideas are illustrated with a number of tables and figures.
-
Computer graphics(CG) is one of the most useful tools by which we can easily understand visible/invisible natural phenomena. Namely, phenomena in the universe is attractive one because of its beauty and invisibility on the earth. For gravitational tensing phenomena, a ray tracing algorithm is proposed based on a lens-plane. In the method, position of gravitational sources is restricted. In this paper an improved visualization method is proposed, which can represent more complex situation than the previous method.
-
A method to analyze the high speed inter-connects that are composed of frequency dependent lossy distributed lines is presented. Network modeling of hybrid systems is implemented by using the modified nodal admittance matrix in the Laplace transformation domain. The network response is computed by different two methods. One method Is the asymptotic waveform evaluation (AWE) method and other is numerical Laplace inversion method. The merits and demerits of two methods are discussed by applying to several concrete illustrative networks.
-
Most systems in tile real world are non-linear and can be represented by the non-linear autoregressive moving average (NARMA) model. The extension of fuzzy system for modeling the system that is represented by NARMA model will be proposed in this paper. Here, fuzzy basis function (FBF) is used as fuzzy NARMA(p,q) model. Then, an approach to Identify fuzzy NARMA models based on fuzzy basis functions is proposed. The efficacy of the proposed approach is shown from experimental results.
-
Recently, the research on computer graphics (CG) has been actively studied and developed. Namely, many surface/solid models have been proposed in the field of computer aided geometric design as well as the one of CG. Since it is difficult to visualize the complex shape exactly, an approximation by generating a set of meshes is usually used. Therefore it is important to guarantee the quality of the approximation in consideration of the computational cost. In this paper, a mesh generation algorithm will be proposed for a surface defined by linear tie algebra The proposed algorithm which considers the quality in the meaning of validation of invariants obtained by the mesh.
-
This paper proposes a selection procedure of geospatial data for location guidance map generation system. The selection procedure requires some targets appointed by users as input data and outputs generation. The procedure is embedded in a prototype of object-oriented GIS. We show sample maps generated by the system.
-
In this paper, a method of estimating second-order Volterra model with ARCH errors is presented. Then we use an ECLMS algorithm for noise canceling of nonlinear time series. The validity of the proposed method is demonstrated for estimating second-order Volterra model with ARCH errors, using computer simulations.
-
In order to understand information of geographic information systems(GIS) exactly and easily, visualization technique becomes important. In this paper, we consider car-traffic which is one of the information accompanying with a map. Then, a visual simulation method is proposed for car-traffic flow at crossing with the cell-automaton and the ray tracing method. We simulate the various situations and discuss about changes of traffic.
-
This paper describes on RF circuit simulation technique, especially on a RF modeling and a model extraction of a LDMOS(Lateral Diffused MOS) that has gate-width (Wg) dependence. Small-signal model parameters of the LDMOSs with various gate-widths extracted from S-parameter data are applied to make the relation between the RF performances and gate-width. It is proved that a source inductance (Ls) was not applicable to scaling rules. These extracted small-signal model parameters are also utilized to remove extrinsic elements in an extraction of a large-signal model (using HP Root MOSFET Model). Therefore, we can omit an additional measurement to extract extrinsic elements. When the large-signal model with Ls having the above gate-width dependence is applied to a high-power LDMOS module, the simulated performances (Output power, etc.) are in a good agreement with experimental results. It is proved that our extracted model and RF circuit simulation have a good accuracy.